Cryptology ePrint Archive: Report 2014/1028
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Payal Chaudhari and Manik Lal Das and Anish Mathuria
Abstract: Attribute-based Encryption (ABE) has found enormous application in fine-grained access control of shared data, particularly in public cloud. In 2013, Zhang et al proposed a scheme called match-then-decrypt , where before running the decryption algorithm the user requires to perform a match operation with attribute(s) that provides the required information to identify whether a particular user is the intended recipient for the ciphertext. As in , the match-then-decrypt operation saves the computational cost at the receiver and the scheme supports receivers' anonymity. In this paper, we show that Zhang et al's scheme  does not support receivers' anonymity. Any legitimate user or an adversary can successfully check whether an attribute is required in the matching phase, in turn, can reveal the receivers' identity from the attribute.
Category / Keywords: Attribute Based Encryption, Anonymity, Anonymous Encryption, Bilinear Pairing
Date: received 2 Jan 2015, last revised 5 Jan 2015
Contact author: payal ldrp at gmail com
Available format(s): PDF | BibTeX Citation
Note: Minor changes in title, abstract and email id due to typo.
Version: 20150105:130541 (All versions of this report)
Short URL: ia.cr/2014/1028
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]