Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security vulnerability in a non-interactive ID-based proxy re-encryption scheme

Authors
Koo, Woo KwonHwang, Jung YeonLee, Dong Hoon
Issue Date
15-Nov-2009
Publisher
ELSEVIER SCIENCE BV
Keywords
Cryptography; Identity-based proxy re-encryption; CCA-security; Collusion attack
Citation
INFORMATION PROCESSING LETTERS, v.109, no.23-24, pp.1260 - 1262
Indexed
SCIE
SCOPUS
Journal Title
INFORMATION PROCESSING LETTERS
Volume
109
Number
23-24
Start Page
1260
End Page
1262
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/118924
DOI
10.1016/j.ipl.2009.09.010
ISSN
0020-0190
Abstract
Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user. (C) 2009 Elsevier B.V. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE