The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Pada tahun 2006, Chatterjee dan Sarkar mencadangkan skim penyulitan berasaskan identiti hierarki (HIBE) yang boleh menyokong bilangan tahap identiti yang tidak terhad. Sifat ini amat berguna dalam menyediakan kerahsiaan hadapan dengan membenamkan komponen masa dalam identiti hierarki. Dalam kertas ini kami menunjukkan bahawa skim mereka tidak menyediakan harta yang dituntut. Analisis kami menunjukkan bahawa jika bilangan tahap identiti menjadi lebih besar daripada nilai parameter awam tetap, penerima yang tidak disengajakan boleh membina semula teks sifir yang sah dan menyahsulit teks sifir menggunakan kunci peribadinya sendiri. Analisis ini juga digunakan pada skim penyulitan berasaskan identiti berbilang penerima yang dibentangkan sebagai aplikasi skim HIBE Chatterjee dan Sarkar.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Jong Hwan PARK, Dong Hoon LEE, "Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 7, pp. 1724-1726, July 2009, doi: 10.1587/transfun.E92.A.1724.
Abstract: In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.1724/_p
Salinan
@ARTICLE{e92-a_7_1724,
author={Jong Hwan PARK, Dong Hoon LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06},
year={2009},
volume={E92-A},
number={7},
pages={1724-1726},
abstract={In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.},
keywords={},
doi={10.1587/transfun.E92.A.1724},
ISSN={1745-1337},
month={July},}
Salinan
TY - JOUR
TI - Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1724
EP - 1726
AU - Jong Hwan PARK
AU - Dong Hoon LEE
PY - 2009
DO - 10.1587/transfun.E92.A.1724
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 7
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - July 2009
AB - In 2006, Chatterjee and Sarkar proposed a hierarchical identity-based encryption (HIBE) scheme which can support an unbounded number of identity levels. This property is particularly useful in providing forward secrecy by embedding time components within hierarchical identities. In this paper we show that their scheme does not provide the claimed property. Our analysis shows that if the number of identity levels becomes larger than the value of a fixed public parameter, an unintended receiver can reconstruct a new valid ciphertext and decrypt the ciphertext using his or her own private key. The analysis is similarly applied to a multi-receiver identity-based encryption scheme presented as an application of Chatterjee and Sarkar's HIBE scheme.
ER -