Comment on “Identity-based non-interactive key distribution with forward security”

被引:0
|
作者
Xi Jun Lin
Ran Ren
Zhengang Wei
Lin Sun
机构
[1] Ocean University of China,Department of Computer Sciences and Technology
[2] Qingdao University,College of Liberal Arts
来源
Designs, Codes and Cryptography | 2015年 / 75卷
关键词
Cryptographic protocols; Non-interactive key distribution; Forward security; Identity-based encryption ; Analysis; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Steinwandt and Corona proposed a forward-secure identity-based non-interactive key distribution (ID-NIKD) scheme and proved its security, and then a forward-secure identity-based encryption (IBE) constructed from their forward-secure ID-NIKD scheme. In this study, attacks are presented to point out that their ID-NIKD scheme and IBE scheme are not forward-secure. We conclude that how to construct a forward-secure ID-NIKD scheme is still an open problem.
引用
收藏
页码:1 / 7
页数:6
相关论文
共 50 条
  • [21] Generic Construction of Forward-Secure Identity-Based Encryption
    Lu, Yang
    Li, Jiguo
    JOURNAL OF COMPUTERS, 2012, 7 (12) : 3068 - 3074
  • [22] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [23] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [24] Plaintext awareness in identity-based key encapsulation
    Manulis, Mark
    Poettering, Bertram
    Stebila, Douglas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 25 - 49
  • [25] Plaintext awareness in identity-based key encapsulation
    Mark Manulis
    Bertram Poettering
    Douglas Stebila
    International Journal of Information Security, 2014, 13 : 25 - 49
  • [26] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Hongfeng Zhu
    Shuai Geng
    Wireless Personal Communications, 2019, 109 : 1911 - 1924
  • [27] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Zhu, Hongfeng
    Geng, Shuai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1911 - 1924
  • [28] Key updating technique in identity-based encryption
    Liu, Shengli
    Long, Yu
    Chen, Kefei
    INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
  • [29] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [30] New technique for chosen-ciphertext security based on non-interactive zero-knowledge
    Seo, Minhye
    Abdalla, Michel
    Lee, Dong Hoon
    Park, Jong Hwan
    INFORMATION SCIENCES, 2019, 490 : 18 - 35