Abstract. In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based encryption scheme based on the q-ABDHE problem with full security in the standard model. Later in Indocrypt’08, they proposed another secure hierarchical identity based encryption scheme based on the q-TBDHE problem with full security in the standard model. They claimed that their schemes have short parameters, high efficiency and tight reduction. However, in this paper we give attacks to show their schemes are insecure at all. Concretely, from any first level private key, the adversary can easily derive a proper “private key ” which can decrypt any ciphertexts for the target identity. That is to say, one key generation query on any first level ...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
Almost all existing hierarchical identity-based encryption (HIBE) schemes fully se-cure in the stand...
Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2...
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity-Based Encryption (IBE)...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) sche...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
phertext hierarchical identity-based encryption (HIBE) protocol. Our main contribu-tion is to presen...
At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encrypt...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows ...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
Almost all existing hierarchical identity-based encryption (HIBE) schemes fully se-cure in the stand...
Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2...
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity-Based Encryption (IBE)...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) sche...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
phertext hierarchical identity-based encryption (HIBE) protocol. Our main contribu-tion is to presen...
At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encrypt...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows ...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...