### Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model

Xu An Wang and Xiaoyuan Yang

##### Abstract

In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based encryption scheme based on the q-ABDHE problem with full security in the standard model. Later in Indocrypt'08, they proposed another secure hierarchical identity based encryption scheme based on the q-TBDHE problem with full security in the standard model. They claimed that their schemes have short parameters, high efficiency and tight reduction. However, in this paper we give attacks to show their schemes are insecure at all. Concretely, from any first level private key, the adversary can easily derive a proper private key'' which can decrypt any ciphertexts for the target identity. That is to say, one key generation query on any first level identity excluding the target's first level identity, is enough to break their schemes.

Available format(s)
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
wangxahq @ yahoo com cn
History
2010-04-01: last of 2 revisions
See all versions
Short URL
https://ia.cr/2010/113

CC BY

BibTeX

@misc{cryptoeprint:2010/113,
author = {Xu An Wang and Xiaoyuan Yang},
title = {Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model},
howpublished = {Cryptology ePrint Archive, Paper 2010/113},
year = {2010},
note = {\url{https://eprint.iacr.org/2010/113}},
url = {https://eprint.iacr.org/2010/113}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.