ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
Cited 11 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
Authors
Woo Kwon Koo, Jung Yeon Hwang, Dong Hoon Lee
Issue Date
2009-11
Citation
Information Processing Letters, v.109, no.23-24, pp.1260-1262
ISSN
0020-0190
Publisher
Elsevier
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1016/j.ipl.2009.09.010
Project Code
09MS2300, Development of Anonymity-based u-Knowledge Security Technology, Cho Hyun Sook
Abstract
Recently, a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest user's private key and thereby decrypt ciphertexts intended for the honest user. © 2009 Elsevier B.V. All rights reserved.
KSP Keywords
CCA-security, Encryption Scheme, ID-based, Identity-based proxy re-encryption, Malicious user, Non-interactive, Security vulnerabilities, collusion attacks, private Key