Paper 2014/937

Analysis of Lewko-Sahai-Waters Revocation System

Zhengjun Cao and Lihua Liu

Abstract

In 2010, Lewko, Sahai and Waters proposed an efficient revocation system but they neglected the security differences between one-to-one encryption and one-to-many encryption. In their system, an authority generates all users' decryption keys once and for all. We remark that the inherent drawback results in that the system is vulnerable to an attack launched by some malicious users. These malicious users could exchange their decryption keys after they receive them from the authority in order to maximize their own interests. Thus, the Lewko-Sahai-Waters revocation system cannot truly revoke a malicious user. From the practical point of view, the flaw discounts greatly the importance of the system.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
Broadcast encryptionrevocation systemone-to-one encryptionone-to-many encryption
Contact author(s)
liulh @ shmtu edu cn
History
2014-11-18: received
Short URL
https://ia.cr/2014/937
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/937,
      author = {Zhengjun Cao and Lihua Liu},
      title = {Analysis of Lewko-Sahai-Waters Revocation System},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/937},
      year = {2014},
      url = {https://eprint.iacr.org/2014/937}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.