Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-06T16:20:05Z-
dc.date.available2021-09-06T16:20:05Z-
dc.date.created2021-06-18-
dc.date.issued2012-09-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/107664-
dc.description.abstractRecently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectDUAL SYSTEM ENCRYPTION-
dc.subjectRANDOM ORACLES-
dc.subjectCIPHERTEXTS-
dc.subjectHIBE-
dc.titleOn the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1587/transfun.E95.A.1631-
dc.identifier.scopusid2-s2.0-84865743096-
dc.identifier.wosid000309043100026-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E95A, no.9, pp.1631 - 1636-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE95A-
dc.citation.number9-
dc.citation.startPage1631-
dc.citation.endPage1636-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusDUAL SYSTEM ENCRYPTION-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusCIPHERTEXTS-
dc.subject.keywordPlusHIBE-
dc.subject.keywordAuthorhierarchical identity based encryption-
dc.subject.keywordAuthorfill security-
dc.subject.keywordAuthorbilinear pairing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE