JCP 2013 Vol.8(9): 2304-2312 ISSN: 1796-203X
doi: 10.4304/jcp.8.9.2304-2312
doi: 10.4304/jcp.8.9.2304-2312
Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes
Jindan Zhang1, Xu An Wang2, and Xiaoyuan Yang2
1 Department of Electronic Information Xianyang Vocational Technical College, 712000, P. R. China
2 Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force, 710086, P. R. China
Abstract—Constructing efficient (Hierarchical) identity based signature/signcryption ((H)IBS/IBSC) schemes in the standard model with full security remain as open problems for a long time. Ren et al. constructed efficient (H)IBS/IBSC schemes with full security without random oracle in ISDPE’ 07 and Chinacrypt’08, . They claimed their schemes can be proved to simultaneously achieve high efficiency, short public parameters and a tight reduction. But we shall show their schemes are not secure. Furthermore, we give improvements to these schemes which can resist the proposed attack. Proxy re-encryption is a primitive which allows the transformation from A’s ciphertext to be B’s ciphertext by using proxies, without the proxy knowing the corresponding plaintexts or secret keys of A or B. Proxy broadcast re-encryption aims at transforming ciphertext from one user to a group, which is a generalization of proxy re-encryption. Recently, Sun et al. proposed a CCA-secure unidirectional proxy broadcast re-encryption in the standard model, we also show their scheme has some flaws.
Index Terms—(Hierarchical) identity based signature/signcryption, Proxy broadcast re-encryption, Attack.
2 Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force, 710086, P. R. China
Abstract—Constructing efficient (Hierarchical) identity based signature/signcryption ((H)IBS/IBSC) schemes in the standard model with full security remain as open problems for a long time. Ren et al. constructed efficient (H)IBS/IBSC schemes with full security without random oracle in ISDPE’ 07 and Chinacrypt’08, . They claimed their schemes can be proved to simultaneously achieve high efficiency, short public parameters and a tight reduction. But we shall show their schemes are not secure. Furthermore, we give improvements to these schemes which can resist the proposed attack. Proxy re-encryption is a primitive which allows the transformation from A’s ciphertext to be B’s ciphertext by using proxies, without the proxy knowing the corresponding plaintexts or secret keys of A or B. Proxy broadcast re-encryption aims at transforming ciphertext from one user to a group, which is a generalization of proxy re-encryption. Recently, Sun et al. proposed a CCA-secure unidirectional proxy broadcast re-encryption in the standard model, we also show their scheme has some flaws.
Index Terms—(Hierarchical) identity based signature/signcryption, Proxy broadcast re-encryption, Attack.
Cite: Jindan Zhang, Xu An Wang, and Xiaoyuan Yang, " Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes," Journal of Computers vol. 8, no. 9, pp. 2304-2312, 2013.
General Information
ISSN: 1796-203X
Abbreviated Title: J.Comput.
Frequency: Bimonthly
Abbreviated Title: J.Comput.
Frequency: Bimonthly
Editor-in-Chief: Prof. Liansheng Tan
Executive Editor: Ms. Nina Lee
Abstracting/ Indexing: DBLP, EBSCO, ProQuest, INSPEC, ULRICH's Periodicals Directory, WorldCat,etc
E-mail: jcp@iap.org
-
Nov 14, 2019 News!
Vol 14, No 11 has been published with online version [Click]
-
Mar 20, 2020 News!
Vol 15, No 2 has been published with online version [Click]
-
Dec 16, 2019 News!
Vol 14, No 12 has been published with online version [Click]
-
Sep 16, 2019 News!
Vol 14, No 9 has been published with online version [Click]
-
Aug 16, 2019 News!
Vol 14, No 8 has been published with online version [Click]
- Read more>>