Security vulnerability in a non-interactive ID-based proxy re-encryption scheme

Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user.

Original languageEnglish
Pages (from-to)1260-1262
Number of pages3
JournalInformation Processing Letters
Volume109
Issue number23-24
DOIs
Publication statusPublished - 2009 Nov 15

Fingerprint

Identity-based
Vulnerability
Encryption
Cryptography
Collusion Attack
Collusion

Keywords

  • CCA-security
  • Collusion attack
  • Cryptography
  • Identity-based proxy re-encryption

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Signal Processing
  • Theoretical Computer Science

Cite this

Security vulnerability in a non-interactive ID-based proxy re-encryption scheme. / Koo, Woo Kwon; Hwang, Jung Yeon; Lee, Dong Hoon.

In: Information Processing Letters, Vol. 109, No. 23-24, 15.11.2009, p. 1260-1262.

Research output: Contribution to journalArticle

Koo, Woo Kwon ; Hwang, Jung Yeon ; Lee, Dong Hoon. / Security vulnerability in a non-interactive ID-based proxy re-encryption scheme. In: Information Processing Letters. 2009 ; Vol. 109, No. 23-24. pp. 1260-1262.
@article{38935f89c7c940c1a9cb6f3227fc2f07,
title = "Security vulnerability in a non-interactive ID-based proxy re-encryption scheme",
abstract = "Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user.",
keywords = "CCA-security, Collusion attack, Cryptography, Identity-based proxy re-encryption",
author = "Koo, {Woo Kwon} and Hwang, {Jung Yeon} and Lee, {Dong Hoon}",
year = "2009",
month = "11",
day = "15",
doi = "10.1016/j.ipl.2009.09.010",
language = "English",
volume = "109",
pages = "1260--1262",
journal = "Information Processing Letters",
issn = "0020-0190",
publisher = "Elsevier",
number = "23-24",

}

TY - JOUR

T1 - Security vulnerability in a non-interactive ID-based proxy re-encryption scheme

AU - Koo, Woo Kwon

AU - Hwang, Jung Yeon

AU - Lee, Dong Hoon

PY - 2009/11/15

Y1 - 2009/11/15

N2 - Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user.

AB - Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user.

KW - CCA-security

KW - Collusion attack

KW - Cryptography

KW - Identity-based proxy re-encryption

UR - http://www.scopus.com/inward/record.url?scp=70350025541&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350025541&partnerID=8YFLogxK

U2 - 10.1016/j.ipl.2009.09.010

DO - 10.1016/j.ipl.2009.09.010

M3 - Article

AN - SCOPUS:70350025541

VL - 109

SP - 1260

EP - 1262

JO - Information Processing Letters

JF - Information Processing Letters

SN - 0020-0190

IS - 23-24

ER -