On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-06T16:20:05Z | - |
dc.date.available | 2021-09-06T16:20:05Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-09 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107664 | - |
dc.description.abstract | Recently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.subject | DUAL SYSTEM ENCRYPTION | - |
dc.subject | RANDOM ORACLES | - |
dc.subject | CIPHERTEXTS | - |
dc.subject | HIBE | - |
dc.title | On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kwangsu | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1587/transfun.E95.A.1631 | - |
dc.identifier.scopusid | 2-s2.0-84865743096 | - |
dc.identifier.wosid | 000309043100026 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E95A, no.9, pp.1631 - 1636 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E95A | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1631 | - |
dc.citation.endPage | 1636 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | DUAL SYSTEM ENCRYPTION | - |
dc.subject.keywordPlus | RANDOM ORACLES | - |
dc.subject.keywordPlus | CIPHERTEXTS | - |
dc.subject.keywordPlus | HIBE | - |
dc.subject.keywordAuthor | hierarchical identity based encryption | - |
dc.subject.keywordAuthor | fill security | - |
dc.subject.keywordAuthor | bilinear pairing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.