Skip to main content
placeholder image

On the security of the identity-based encryption based on DHIES from ASIACCS 2010

Conference Paper


Abstract


  • In ASIACCS 2010, Chen, Charlemagne, Guan, Hu and Chen

    proposed an interesting construction of identity-based encryption

    based on DHIES, whose key extraction algorithm

    makes use of the multivariate quadratic equation. They

    proved that their scheme is selective-ID secure against chosen

    ciphertext attack, i.e. secure in the sense of IND-sIDGGA.

    Unfortunately, in this paper, we demonstrate that Chen

    et aJ.'s scheme is insecure in the sense of IND-sID-GGA by

    showing that the private key extraction algorithm of their

    scheme can be exploited to apply XL algorithm, which is

    to solve the multivariate quadratic (MQ) problem (under

    certain conditions).

Publication Date


  • 2011

Citation


  • Susilo, W., Baek, J. & Wong, D. S. (2011). On the security of the identity-based encryption based on DHIES from ASIACCS 2010. In B. Cheung, L. Hui & R. Sandhu (Eds.), Proceedings of the 6th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011) (pp. 376-380). New York: ACM.

Scopus Eid


  • 2-s2.0-79956036822

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1989

Has Global Citation Frequency


Start Page


  • 376

End Page


  • 380

Place Of Publication


  • New York

Abstract


  • In ASIACCS 2010, Chen, Charlemagne, Guan, Hu and Chen

    proposed an interesting construction of identity-based encryption

    based on DHIES, whose key extraction algorithm

    makes use of the multivariate quadratic equation. They

    proved that their scheme is selective-ID secure against chosen

    ciphertext attack, i.e. secure in the sense of IND-sIDGGA.

    Unfortunately, in this paper, we demonstrate that Chen

    et aJ.'s scheme is insecure in the sense of IND-sID-GGA by

    showing that the private key extraction algorithm of their

    scheme can be exploited to apply XL algorithm, which is

    to solve the multivariate quadratic (MQ) problem (under

    certain conditions).

Publication Date


  • 2011

Citation


  • Susilo, W., Baek, J. & Wong, D. S. (2011). On the security of the identity-based encryption based on DHIES from ASIACCS 2010. In B. Cheung, L. Hui & R. Sandhu (Eds.), Proceedings of the 6th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011) (pp. 376-380). New York: ACM.

Scopus Eid


  • 2-s2.0-79956036822

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1989

Has Global Citation Frequency


Start Page


  • 376

End Page


  • 380

Place Of Publication


  • New York