International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model

Authors:
Xu An Wang
Xiaoyuan Yang
Download:
URL: http://eprint.iacr.org/2010/113
Search ePrint
Search Google
Abstract: In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based encryption scheme based on the q-ABDHE problem with full security in the standard model. Later in Indocrypt'08, they proposed another secure hierarchical identity based encryption scheme based on the q-TBDHE problem with full security in the standard model. They claimed that their schemes have short parameters, high efficiency and tight reduction. However, in this paper we give attacks to show their schemes are insecure at all. Concretely, from any first level private key, the adversary can easily derive a proper ``private key'' which can decrypt any ciphertexts for the target identity. That is to say, one key generation query on any first level identity excluding the target's first level identity, is enough to break their schemes.
BibTeX
@misc{eprint-2010-23014,
  title={Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography /},
  url={http://eprint.iacr.org/2010/113},
  note={ wangxahq@yahoo.com.cn 14700 received 1 Mar 2010, last revised 1 Apr 2010},
  author={Xu An Wang and Xiaoyuan Yang},
  year=2010
}