The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Récemment, Hu et al. ont suggéré un système de chiffrement hiérarchique basé sur l'identité (HIBE) entièrement sécurisé qui permet d'obtenir un texte chiffré de taille constante et une réduction stricte de la sécurité. Leur construction était basée sur le système IBE de Gentry qui soutient leur preuve de sécurité. Dans cet article, nous montrons que leur preuve de sécurité est incorrecte. Nous soulignons la différence entre la preuve de Gentry et celle de Hu et al., et nous montrons que la sécurité du schéma HIBE de Hu et al. ne peut pas être réduite à leur hypothèse de complexité revendiquée.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Jong Hwan PARK, Dong Hoon LEE, "Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 6, pp. 1269-1273, June 2010, doi: 10.1587/transfun.E93.A.1269.
Abstract: Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.1269/_p
Copier
@ARTICLE{e93-a_6_1269,
author={Jong Hwan PARK, Dong Hoon LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme},
year={2010},
volume={E93-A},
number={6},
pages={1269-1273},
abstract={Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.},
keywords={},
doi={10.1587/transfun.E93.A.1269},
ISSN={1745-1337},
month={June},}
Copier
TY - JOUR
TI - Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1269
EP - 1273
AU - Jong Hwan PARK
AU - Dong Hoon LEE
PY - 2010
DO - 10.1587/transfun.E93.A.1269
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 2010
AB - Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.
ER -