Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Cryptanalysis of an identity based broadcast encryption scheme without random oracles

Published: 01 April 2011 Publication History

Abstract

Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure.

References

[1]
Ren, Y. and Gu, D., Fully CCA2 secure identity based broadcast encryption without random oracles. Inf. Process. Lett. v109 i11. 527-533.
[2]
Fiat, A. and Naor, M., Broadcast encryption. In: Stinson, D.R. (Ed.), Lecture Notes in Computer Science, vol. 773. Springer. pp. 480-491.
[3]
Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (Ed.), Lecture Notes in Computer Science, vol. 3621. Springer. pp. 258-275.
[4]
Delerablée, C., Paillier, P. and Pointcheval, D., Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (Eds.), Lecture Notes in Computer Science, vol. 4575. Springer. pp. 39-59.
[5]
Shamir, A., Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (Eds.), Lecture Notes in Computer Science, vol. 196. Springer. pp. 47-53.
[6]
Boneh, D. and Franklin, M.K., Identity-based encryption from the Weil pairing. In: Kilian, J. (Ed.), Lecture Notes in Computer Science, vol. 2139. Springer. pp. 213-229.
[7]
Boneh, D. and Franklin, M.K., Identity-based encryption from the Weil pairing. SIAM J. Comput. v32 i3. 586-615.
[8]
Boneh, D. and Boyen, X., Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J. (Eds.), Lecture Notes in Computer Science, vol. 3027. Springer. pp. 223-238.
[9]
Boneh, D. and Boyen, X., Secure identity based encryption without random oracles. In: Franklin, M.K. (Ed.), Lecture Notes in Computer Science, vol. 3152. Springer. pp. 443-459.
[10]
Waters, B., Efficient identity-based encryption without random oracles. In: Cramer, R. (Ed.), Lecture Notes in Computer Science, vol. 3494. Springer. pp. 114-127.
[11]
Gentry, C., Practical identity-based encryption without random oracles. In: Vaudenay, S. (Ed.), Lecture Notes in Computer Science, vol. 4004. Springer. pp. 445-464.
[12]
Delerablée, C., Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (Ed.), Lecture Notes in Computer Science, vol. 4833. Springer. pp. 200-215.

Cited By

View all
  • (2022)Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge CollaborationACM Transactions on Sensor Networks10.1145/352951018:3(1-27)Online publication date: 19-Apr-2022
  • (2019)Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertextSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-019-04219-524:6(4589-4606)Online publication date: 12-Jul-2019
  • (2012)Direct CCA secure identity-based broadcast encryptionProceedings of the 6th international conference on Network and System Security10.1007/978-3-642-34601-9_26(348-360)Online publication date: 21-Nov-2012
  1. Cryptanalysis of an identity based broadcast encryption scheme without random oracles

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Information Processing Letters
        Information Processing Letters  Volume 111, Issue 10
        April, 2011
        51 pages

        Publisher

        Elsevier North-Holland, Inc.

        United States

        Publication History

        Published: 01 April 2011

        Author Tags

        1. Chosen-ciphertext attack
        2. Chosen-plaintext attack
        3. Cryptography
        4. Identity based broadcast encryption

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 01 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge CollaborationACM Transactions on Sensor Networks10.1145/352951018:3(1-27)Online publication date: 19-Apr-2022
        • (2019)Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertextSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-019-04219-524:6(4589-4606)Online publication date: 12-Jul-2019
        • (2012)Direct CCA secure identity-based broadcast encryptionProceedings of the 6th international conference on Network and System Security10.1007/978-3-642-34601-9_26(348-360)Online publication date: 21-Nov-2012

        View Options

        View options

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media