Abstract:How to create an identity-based encryption (IBE) scheme with tight chosen-ciphertext attacks (CCA) security based on the static assumption is an open problem.A publicly verifiable anonymous IBE scheme designed in the standard model claimed that the CCA security of proposed scheme was proved based on the classic static assumption.However, in this paper, we demonstrate that the previous IBE scheme cannot achieve the claimed CCA security because the ciphertext was extensile.In other words, a valid encrypted ciphertext can be forged by any adversary from a known ciphertext.To analyze the security of the previous IBE scheme, two methods are proposed based on the criterion of ciphertext equality.Additionally, based on the analysis of the previous IBE scheme, we point out the shortcomings of the original security proof.
杨启良, 周彦伟, 杨坤伟, 王涛. 标准模型下可公开验证的匿名IBE方案的安全性分析[J]. 电子学报, 2020, 48(2): 291-295.
YANG Qi-liang, ZHOU Yan-wei, YANG Kun-wei, WANG Tao. On the Security of Publicly Verifiable Anonymous IBE Scheme in the Standard Model. Acta Electronica Sinica, 2020, 48(2): 291-295.
[1] SHAMIR A.Identity-based cryptosystems and signature schemes[A].Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,1985.47-53.
[2] BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[A].Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2001.213-229.
[3] BONEH D,BOYEN X.Efficient selective-ID secure identity-based encryption without random oracles[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2004.223-238.
[4] BONEH D,BOYEN X.Secure identity-based encryption without random oracles[A].Annual International Cryptology Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2004.443-459.
[5] WATERS B.Efficient identity-based encryption without random oracles[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2005.114-127.
[6] GENTRY C.Practical identity-based encryption without random oracles[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin Heidelberg:Springer,2006.445-464.
[7] 李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. LI Da-wei,YANG Gen,ZHU Li. An ID-based verifiable secret sharing scheme[J].Acta Electronica Sinica,2010,38(9):2059-2065.(in Chinese)
[8] 明洋,王育民.标准模型下可证安全的通配符基于身份加密方案[J].电子学报,2013,41(10):2082-2086. MING Yang,WANG Yu-min.Provably secure identity-based encryption scheme with wildcard in the standard model[J].Acta Electronica Sinica,2013,41(10):2082-2086.(in Chinese)
[9] HU M X,Ye Q,Tang Y L.Efficient batch identity-based fully homomorphic encryption scheme in the standard model[J].IET Information Security,2018,12(6):475-483.
[10] LI X G,XIANG T,CHEN F,GUO S W.Efficient biometric identity-based encryption[J].Information Sciences,2018,465:248-264.
[11] WU L B,ZHANG Y B,CHOO K K,HE D B.Efficient and secure identity-based encryption scheme with equality test in cloud computing[J].Future Generation Computer Systems,2017,73:22-31.
[12] HAN S,LIU S L,QIN B D,GU D W.Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness[J].Designs,Codes and Cryptography,2018,86(3):517-554.
[13] 李顺东,杨坤伟,巩林明,毛庆,刘新.标准模型下可公开验证的匿名IBE方案[J].电子学报,2016,44(3),673-678. LI Shun-dong,YANG Kun-wei,GONG Lin-ming,MAO Qing,LIU Xin.A publicly verifiable anonymous IBE scheme in the standard model[J].Acta Electronica Sinica,2016,44(3),673-678.(in Chinese)