ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
Cited 11 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee
Issue Date
2009-11
Citation
Information Processing Letters, v.109, no.23-24, pp.1260-1262
ISSN
0020-0190
Publisher
Elsevier
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1016/j.ipl.2009.09.010
Abstract
Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user. © 2009 Elsevier B.V. All rights reserved.
KSP Keywords
CCA-security, Encryption Scheme, ID-based, Malicious user, Non-interactive, Security vulnerabilities, collusion attacks, identity-based proxy re-encryption, private Key