The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
2006년에 Chatterjee와 Sarkar는 무제한의 ID 수준을 지원할 수 있는 계층적 ID 기반 암호화(HIBE) 체계를 제안했습니다. 이 속성은 계층적 ID 내에 시간 구성 요소를 삽입하여 순방향 비밀성을 제공하는 데 특히 유용합니다. 이 논문에서 우리는 그들의 계획이 청구된 재산을 제공하지 않는다는 것을 보여줍니다. 우리의 분석에 따르면 ID 수준 수가 고정된 공개 매개변수의 값보다 커지면 의도하지 않은 수신자가 새로운 유효한 암호문을 재구성하고 자신의 개인 키를 사용하여 암호문을 해독할 수 있는 것으로 나타났습니다. 분석은 Chatterjee와 Sarkar의 HIBE 방식의 응용으로 제시된 다중 수신자 ID 기반 암호화 방식에도 유사하게 적용됩니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Jong Hwan PARK, Dong Hoon LEE, "Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 7, pp. 1724-1726, July 2009, doi: 10.1587/transfun.E92.A.1724.
Abstract: In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.1724/_p
부
@ARTICLE{e92-a_7_1724,
author={Jong Hwan PARK, Dong Hoon LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06},
year={2009},
volume={E92-A},
number={7},
pages={1724-1726},
abstract={In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.},
keywords={},
doi={10.1587/transfun.E92.A.1724},
ISSN={1745-1337},
month={July},}
부
TY - JOUR
TI - Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1724
EP - 1726
AU - Jong Hwan PARK
AU - Dong Hoon LEE
PY - 2009
DO - 10.1587/transfun.E92.A.1724
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 7
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - July 2009
AB - In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.
ER -