ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
Cited 11 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
구우권, 황정연, 이동훈
발행일
200911
출처
Information Processing Letters, v.109 no.23-24, pp.1260-1262
ISSN
0020-0190
출판사
Elsevier
DOI
https://dx.doi.org/10.1016/j.ipl.2009.09.010
협약과제
09MS2300, 익명성 기반의 u지식정보보호기술 개발, 조현숙
초록
Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user. © 2009 Elsevier B.V. All rights reserved.
KSP 제안 키워드
CCA-security, Encryption Scheme, ID-based, Identity-based proxy re-encryption, Malicious user, Non-interactive, Security vulnerabilities, collusion attacks, private Key