中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
cryptanalysis of an identity based broadcast encryption scheme without random oracles
Author: Wang Xu An ; Weng Jian ; Yang Xiaoyuan ; Yang Yanjiang
Keyword: Data processing ; Security of data
Source: Information Processing Letters
Issued Date: 2011
Volume: 111, Issue:10, Pages:461-464
Indexed Type: ei
Department: (1) Key Laboratory of Information and Network Security, Engineering College of Chinese Armed Police Force, Xian 710086, China; (2) State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; (3) Department of Computer Science, Jinan University, Guangzhou 510632, China; (4) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China; (5) Institute for Infocomm Research (I2R), Singapore 119613, Singapore
English Abstract: Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure. © 2011 Elsevier B.V. All rights reserved.
Language: 英语
WOS ID: WOS:000289602400002
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/14047
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:
File Name/ File Size Content Type Version Access License
Cryptanalysis of an identity based broadcast encryption scheme without random oracles.pdf(128KB)----限制开放-- 联系获取全文

Recommended Citation:
Wang Xu An,Weng Jian,Yang Xiaoyuan,et al. cryptanalysis of an identity based broadcast encryption scheme without random oracles[J]. Information Processing Letters,2011-01-01,111(10):461-464.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Wang Xu An]'s Articles
[Weng Jian]'s Articles
[Yang Xiaoyuan]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Wang Xu An]‘s Articles
[Weng Jian]‘s Articles
[Yang Xiaoyuan]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace