Logo Goletty

Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes
Journal Title Journal of Computers
Journal Abbreviation jcp
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (546 kb)
   
Title Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes
Authors Yang, Xiaoyuan; Wang, Xu An; Zhang, Jindan
Abstract Constructing efficient (Hierarchical) identitybased signature/signcryption ((H)IBS/IBSC) schemes in thestandard model with full security remain as open problemsfor a long time. Ren et al. constructed efficient (H)IBS/IBSCschemes with full security without random oracle in ISDPE’07 and Chinacrypt’08, . They claimed their schemescan be proved to simultaneously achieve high efficiency,short public parameters and a tight reduction. But weshall show their schemes are not secure. Furthermore, wegive improvements to these schemes which can resist theproposed attack. Proxy re-encryption is a primitive whichallows the transformation from A’s ciphertext to be B’sciphertext by using proxies, without the proxy knowing thecorresponding plaintexts or secret keys of A or B. Proxybroadcast re-encryption aims at transforming ciphertextfrom one user to a group, which is a generalization of proxyre-encryption. Recently, Sun et al. proposed a CCA-secureunidirectional proxy broadcast re-encryption in the standardmodel, we also show their scheme has some flaws.
Publisher ACADEMY PUBLISHER
Date 2013-09-01
Source Journal of Computers Vol 8, No 9 (2013)
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html.

 

See other article in the same Issue


Goletty © 2024