Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011
DOI: 10.1145/1966913.1966962
|View full text |Cite
|
Sign up to set email alerts
|

On the security of the identity-based encryption based on DHIES from ASIACCS 2010

Abstract: In ASIACCS 2010, Chen, Charlemagne, Guan, Hu and Chen proposed an interesting construction of identity-based encryption based on DHIES, whose key extraction algorithm makes use of the multivariate quadratic equation. They proved that their scheme is selective-ID secure against chosen ciphertext attack, i.e. secure in the sense of IND-sID-CCA. Unfortunately, in this paper, we demonstrate that Chen et al.'s scheme is insecure in the sense of IND-sID-CCA by showing that the private key extraction algorithm of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
9
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 20 publications
1
9
0
Order By: Relevance
“…As with our attacks, this invalidates the security claims made in [5]. However, our attacks are considerably more flexible, much more efficient than the attack in [10] and exploit more structure of the particular construction proposed in [5]. Moreover, we provide concrete attack costs for the parameters proposed in [5] (something that was omitted in [10]), we highlight the flaw in the security proof given in [5], and we show that there is a design flaw in the construction of private keys in the scheme which enables attacks beyond straight-forward system solving.…”
Section: Introductionmentioning
confidence: 79%
See 4 more Smart Citations
“…As with our attacks, this invalidates the security claims made in [5]. However, our attacks are considerably more flexible, much more efficient than the attack in [10] and exploit more structure of the particular construction proposed in [5]. Moreover, we provide concrete attack costs for the parameters proposed in [5] (something that was omitted in [10]), we highlight the flaw in the security proof given in [5], and we show that there is a design flaw in the construction of private keys in the scheme which enables attacks beyond straight-forward system solving.…”
Section: Introductionmentioning
confidence: 79%
“…In [10], Susilo and Baek also present an attack against the scheme of [5]. We stress that our work was done independently of and in parallel to [10].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations