Computer Science & Technology

Cryptanalysis of an IB-PRE Scheme with Source Hiding Property

Expand
  • 1. School of Computer Science and Engineering , South China University of Technology , Guangzhou 510640 , Guangdong , China ;2. School of Computer Engineering , Guangzhou College of South China University of Technology , Guangzhou 510800 ,Guangdong , China
郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 .

Received date: 2014-05-04

  Revised date: 2014-07-12

  Online published: 2014-12-01

Supported by

Supported by the National Natural Science Foundation of China ( 61272413 )

Abstract

As Emura-IB-PRE , an identity label-based proxy re-encryption scheme proposed by Emura et al. , is of source hiding property and chosen ciphertext security in random oracle model , a chosen ciphertext security method to attack Emura-IB-PRE scheme is proposed , and Emura-IB-PRE is proved invalid in resisting the chosen ciphertext attack. In order to solve this problem , an improved scheme named E-SH-IB-PRE is presented and the corresponding security proof is given. The results indicate the presented scheme is secure against chosen ciphertext attack with source hiding property in random oracle model , and that the principle , i.e. , the first level ciphertext can be publicly verified by proxy , is important for proxy re-encryption schemes.

Cite this article

Zheng Yu-lin Cai Yi . Cryptanalysis of an IB-PRE Scheme with Source Hiding Property[J]. Journal of South China University of Technology(Natural Science), 2015 , 43(1) : 118 -125 . DOI: 10.3969/j.issn.1000-565X.2015.01.019

Outlines

/