Comment on “Identity-based non-interactive key distribution with forward security”

被引:0
|
作者
Xi Jun Lin
Ran Ren
Zhengang Wei
Lin Sun
机构
[1] Ocean University of China,Department of Computer Sciences and Technology
[2] Qingdao University,College of Liberal Arts
来源
Designs, Codes and Cryptography | 2015年 / 75卷
关键词
Cryptographic protocols; Non-interactive key distribution; Forward security; Identity-based encryption ; Analysis; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Steinwandt and Corona proposed a forward-secure identity-based non-interactive key distribution (ID-NIKD) scheme and proved its security, and then a forward-secure identity-based encryption (IBE) constructed from their forward-secure ID-NIKD scheme. In this study, attacks are presented to point out that their ID-NIKD scheme and IBE scheme are not forward-secure. We conclude that how to construct a forward-secure ID-NIKD scheme is still an open problem.
引用
收藏
页码:1 / 7
页数:6
相关论文
共 50 条
  • [41] Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 354 - 375
  • [42] Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update
    Zhang, Xiangsong
    Liu, Zhenhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2792 - 2810
  • [43] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [44] Relations between semantic security and anonymity in identity-based encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 453 - 460
  • [45] Mediated Hierarchical Identity-Based Combined Public Key Schemes
    Wang, Pingjian
    Lin, Jingqiang
    Jing, Jiwu
    Xie, Yongquan
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 614 - 618
  • [46] Identity-based encryptions with tight security reductions to the BDH problem
    Nishioka, Mototsugu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (05) : 1241 - 1252
  • [47] Identity-based forward secure threshold signature scheme based on mediated rsa
    Yu J.
    Hao R.
    Kong F.
    Cheng X.
    Zhao H.
    Chen Y.
    International Journal of Computers and Applications, 2010, 32 (04) : 469 - 475
  • [48] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850
  • [49] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [50] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850