Comment on “Identity-based non-interactive key distribution with forward security”

被引:0
|
作者
Xi Jun Lin
Ran Ren
Zhengang Wei
Lin Sun
机构
[1] Ocean University of China,Department of Computer Sciences and Technology
[2] Qingdao University,College of Liberal Arts
来源
Designs, Codes and Cryptography | 2015年 / 75卷
关键词
Cryptographic protocols; Non-interactive key distribution; Forward security; Identity-based encryption ; Analysis; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Steinwandt and Corona proposed a forward-secure identity-based non-interactive key distribution (ID-NIKD) scheme and proved its security, and then a forward-secure identity-based encryption (IBE) constructed from their forward-secure ID-NIKD scheme. In this study, attacks are presented to point out that their ID-NIKD scheme and IBE scheme are not forward-secure. We conclude that how to construct a forward-secure ID-NIKD scheme is still an open problem.
引用
收藏
页码:1 / 7
页数:6
相关论文
共 50 条
  • [31] Non-Interactive Forward-Secure Threshold Signature without Random Oracles
    Yu, Jia
    Kong, Fan-Yu
    Zhao, Hua-Wei
    Cheng, Xiang-Guo
    Hao, Rong
    Guo, Xiang-Fa
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 571 - 586
  • [32] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [33] KDM security for identity-based encryption: Constructions and separations
    Chen, Yu
    Zhang, Jiang
    Deng, Yi
    Chang, Jinyong
    INFORMATION SCIENCES, 2019, 486 : 450 - 473
  • [34] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [35] A Note on the Security Proof of Waters Identity-Based Encryption
    Hui, Jianbin
    Wang, Huaixi
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 420 - 423
  • [36] Efficient identity-based encryption with tight security reduction
    Attrapadung, Nuttapong
    Furukawa, Jun
    Gomi, Takeshi
    Hanaoka, Goichiro
    Imai, Hideki
    Zhang, Rui
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1803 - 1813
  • [37] A Framework for Identity-Based Encryption with Almost Tight Security
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 521 - 549
  • [38] Identity-based parallel key-insulated encryption without random oracles: Security notions and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 409 - +
  • [39] Forward-secure identity-based signature with efficient revocation
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (07) : 1390 - 1411
  • [40] ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer
    Chen, YH
    Hwang, T
    COMPUTER COMMUNICATIONS, 1995, 18 (12) : 993 - 996