Show simple item record

dc.contributor.authorHerranz Sotoca, Javier
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament de Matemàtiques
dc.date.accessioned2017-12-04T11:07:37Z
dc.date.available2017-12-04T11:07:37Z
dc.date.issued2017-11-01
dc.identifier.citationHerranz, J. Attribute-based encryption implies identity-based encryption. "IET information security", 1 Novembre 2017, vol. 11, núm. 6, p. 332-337.
dc.identifier.issn1751-8709
dc.identifier.urihttp://hdl.handle.net/2117/111526
dc.description.abstractIn this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, they show how an attribute-based encryption scheme which admits, at least, and policies can be combined with a collision-resistant hash function to obtain an identity-based encryption scheme. Even if this result may seem natural, not surprising at all, it has not been explicitly written anywhere, as far as they know. Furthermore, it may be an unknown result for some people: Odelu et al. in 2016 and 2017 have proposed both an attribute-based encryption scheme in the discrete logarithm setting, without bilinear pairings, and an attribute-based encryption scheme in the RSA setting, both admitting and policies. If these schemes were secure, then by using the implication proved in this study, one would obtain secure identity-based encryption schemes in both the RSA and the discrete logarithm settings, without bilinear pairings, which would be a breakthrough in the area. Unfortunately, the author presents here complete attacks of the two schemes proposed by Odelu et al.
dc.format.extent6 p.
dc.language.isoeng
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subject.lcshCryptography
dc.subject.otherIdentity-based encryption
dc.titleAttribute-based encryption implies identity-based encryption
dc.typeArticle
dc.subject.lemacEncriptació de dades (Informàtica)
dc.contributor.groupUniversitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia
dc.identifier.doi10.1049/iet-ifs.2016.0490
dc.relation.publisherversionhttp://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2016.0490
dc.rights.accessOpen Access
drac.iddocument21606080
dc.description.versionPostprint (updated version)
upcommons.citation.authorHerranz, J.
upcommons.citation.publishedtrue
upcommons.citation.publicationNameIET information security
upcommons.citation.volume11
upcommons.citation.number6
upcommons.citation.startingPage332
upcommons.citation.endingPage337


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Except where otherwise noted, content on this work is licensed under a Creative Commons license: Attribution-NonCommercial-NoDerivs 3.0 Spain