Journal of South China University of Technology (Natural Science Edition) ›› 2015, Vol. 43 ›› Issue (1): 118-125.doi: 10.3969/j.issn.1000-565X.2015.01.019

• Computer Science & Technology • Previous Articles     Next Articles

Cryptanalysis of an IB-PRE Scheme with Source Hiding Property

Zheng Yu-lin1 Cai Yi2   

  1. 1. School of Computer Science and Engineering , South China University of Technology , Guangzhou 510640 , Guangdong , China ;2. School of Computer Engineering , Guangzhou College of South China University of Technology , Guangzhou 510800 ,Guangdong , China
  • Received:2014-05-04 Revised:2014-07-12 Online:2015-01-25 Published:2014-12-01
  • Contact: 郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 . E-mail:gz.zheng.yulin@gmail.com
  • About author:郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 .
  • Supported by:
    Supported by the National Natural Science Foundation of China ( 61272413 )

Abstract: As Emura-IB-PRE , an identity label-based proxy re-encryption scheme proposed by Emura et al. , is of source hiding property and chosen ciphertext security in random oracle model , a chosen ciphertext security method to attack Emura-IB-PRE scheme is proposed , and Emura-IB-PRE is proved invalid in resisting the chosen ciphertext attack. In order to solve this problem , an improved scheme named E-SH-IB-PRE is presented and the corresponding security proof is given. The results indicate the presented scheme is secure against chosen ciphertext attack with source hiding property in random oracle model , and that the principle , i.e. , the first level ciphertext can be publicly verified by proxy , is important for proxy re-encryption schemes.

Key words: proxy re-encryption, encryption algorithm, source hiding property, chosen ciphertext attack