Analysis on Hu et al.'s Identity-based Broadcast Encryption

نویسندگان

  • Xingwen Zhao
  • Fangguo Zhang
چکیده

Analysis is given on Hu et al.’s efficient identity-based broadcast encryption (IBBE) scheme published in Journal of Computers, Vol. 5, No. 3, March 2010. Two major flaws are described. One is that valid group members outside the receiver set can still decrypt the ciphertext, which contradicts the authors’ definition for IBBE. The other is that, given a valid private key, it is easy to generate private keys for other people without interacting with Private Key Generator (PKG).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Short Hierarchical Identity-based Encryption in the Selective-ID Model

Recently Zhang et al. proposed a hierarchical identity-based encryption scheme which is the first efficient scheme where both ciphertexts and private keys achieve O(1)size, and is the best trade-off between private key size and ciphertext size at present. However, in this paper, it will be pointed out that their scheme exists an ambiguity or shortcoming which makes their scheme be insecure or n...

متن کامل

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme

In 2010, Fan et al. presented an anonymous multi-receiver identity-based encryption scheme where they adopt Lagrange interpolating polynomial mechanism. They showed that their scheme makes it impossible for an attacker or any other message receiver to derive the identity of a message receiver such that the privacy of every receiver can be guaranteed. They also formally showed that every receive...

متن کامل

Efficient Identity-based Broadcast Encryption without Random Oracles

We propose a new efficient identity-based broadcast encryption scheme without random oracles and prove that it achieves selective identity, chosen plaintext security. Our scheme is constructed based on bilinear Diffie-Hellman inversion assumption and it is a good efficient hybrid encryption scheme, which achieves O(1)-size ciphertexts, public parameters and constant size private keys. In our sc...

متن کامل

An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol

Lei et al. [26] proposed a new asymmetric group key agreement protocol allowing a set of users to negotiate a common encryption key accessible by any user, and each user holds her respective decryption key. This enables the confidential message communication among group users, and grants any outsider to send message to the group. In this paper, an authenticated asymmetric group key agreement pr...

متن کامل

Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme

Signcryption can realize the function of encryption and signature in a reasonable logic step, which can lower computational costs and communication overheads. In 2008, S. S. D. Selvi et al. proposed an identitybased threshold signcryption scheme. In this paper, we show that the threshold signcryption scheme of S. S. D. Selvi et al. is vulnerable if the attacker can replaces the group public key...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2011