Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme

Jong Hwan PARK  Dong Hoon LEE  

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E93-A   No.6   pp.1269-1273
Publication Date: 2010/06/01
Online ISSN: 1745-1337
DOI: 10.1587/transfun.E93.A.1269
Print ISSN: 0916-8508
Type of Manuscript: LETTER
Category: Cryptography and Information Security
hierarchical identity-based encryption,  full security,  bilinear maps,  

Full Text: PDF>>
Buy this Article

Recently, Hu et al. have suggested a fully secure hierarchical identity-based encryption (HIBE) scheme that achieves constant size ciphertext and tight security reduction. Their construction was based on Gentry's IBE scheme that supports their security proof. In this paper, we show that their security proof is incorrect. We point out the difference between Gentry's proof and that of Hu et al., and we show that the security of Hu et al.'s HIBE scheme cannot be reduced to their claimed complexity assumption.