Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test

被引:9
作者
Liao, Yongjian [1 ]
Chen, Hongjie [1 ]
Li, Fagen [2 ]
Jiang, Shaoquan [3 ]
Zhou, Shijie [1 ]
Mohammed, Ramadan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
[3] Mianyang Normal Univ, Inst Informat Secur, Mianyang 621000, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; one-way; equality test; chosen cihpertext attack; cloud computing; insecurity; IDENTITY-BASED ENCRYPTION; EFFICIENT;
D O I
10.1109/ACCESS.2018.2808944
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption is a popular cryptographic technology to protect the privacy of clients' data in cloud computing. In order to make the scheme have the functionality of comparing ciphertext, Zhu et al. combined concepts of key-policy attributed-based encryption with public key encryption with equality test and proposed key-policy attributed-based encryption with equality test. They defined its security model and put forward a scheme from bilinear pairing. In this paper, we first use two methods to show that their scheme is not secure for one-way under chosen ciphertext attack. Next, we show that the scheme is not secure for a test under chosen ciphertext attack defined in their paper yet. Finally, we point out the definition of a test under chosen ciphertext attack is very strong, which causes no scheme to satisfy the model.
引用
收藏
页码:10189 / 10196
页数:8
相关论文
共 14 条
  • [1] [Anonymous], 2001, INT C THEORY APPL CR, DOI DOI 10.1007/3-540-45682-1_30
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [5] Semi-generic construction of public key encryption and identity-based encryption with equality test
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    [J]. INFORMATION SCIENCES, 2016, 373 : 419 - 440
  • [6] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    [J]. INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [7] Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
    Ma, Sha
    Huang, Qiong
    Zhang, Mingwu
    Yang, Bo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 458 - 470
  • [8] Qiang Tang, 2012, International Journal of Applied Cryptography, V2, P304, DOI 10.1504/IJACT.2012.048079
  • [9] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [10] Public key encryption supporting plaintext equality test and user-specified authorization
    Tang, Qiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1351 - 1362