2 research outputs found

    Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model

    Get PDF
    In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based encryption scheme based on the q-ABDHE problem with full security in the standard model. Later in Indocrypt\u2708, they proposed another secure hierarchical identity based encryption scheme based on the q-TBDHE problem with full security in the standard model. They claimed that their schemes have short parameters, high efficiency and tight reduction. However, in this paper we give attacks to show their schemes are insecure at all. Concretely, from any first level private key, the adversary can easily derive a proper ``private key\u27\u27 which can decrypt any ciphertexts for the target identity. That is to say, one key generation query on any first level identity excluding the target\u27s first level identity, is enough to break their schemes

    Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model

    No full text
    corecore