Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jong Hwan PARK, Dong Hoon LEE, "Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 6, pp. 1269-1273, June 2010, doi: 10.1587/transfun.E93.A.1269.
Abstract: Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.1269/_p
Copy
@ARTICLE{e93-a_6_1269,
author={Jong Hwan PARK, Dong Hoon LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme},
year={2010},
volume={E93-A},
number={6},
pages={1269-1273},
abstract={Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.},
keywords={},
doi={10.1587/transfun.E93.A.1269},
ISSN={1745-1337},
month={June},}
Copy
TY - JOUR
TI - Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1269
EP - 1273
AU - Jong Hwan PARK
AU - Dong Hoon LEE
PY - 2010
DO - 10.1587/transfun.E93.A.1269
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 2010
AB - Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.
ER -