Cryptology ePrint Archive: Report 2010/113
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Xu An Wang and Xiaoyuan Yang
Abstract: In Informatica 32 (2008), Ren and Gu proposed an anonymous
hierarchical identity based encryption scheme based on the q-ABDHE
problem with full security in the standard model. Later in
Indocrypt'08, they proposed another secure hierarchical identity
based encryption scheme based on the q-TBDHE problem with full
security in the standard model. They claimed that their schemes have
short parameters, high efficiency and tight reduction. However, in
this paper we give attacks to show their schemes are insecure at
all. Concretely, from any first level private key, the adversary can
easily derive a proper ``private key'' which can decrypt any
ciphertexts for the target identity. That is to say, one key
generation query on any first level identity excluding the target's
first level identity, is enough to break their schemes.
Category / Keywords: public-key cryptography /
Date: received 1 Mar 2010, last revised 1 Apr 2010
Contact author: wangxahq at yahoo com cn
Available formats: PDF | BibTeX Citation
Version: 20100401:123934 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]