{"title":"Ming等人基于属性的可撤销多授权加密的密码分析","authors":"Yi-Fan Tseng, Hao Yang, Chieh-Han Wu, Tsung-Yu Chien, R. Tso, Zi-Yuan Liu, Jen-Chieh Hsu","doi":"10.1109/AsiaJCIS57030.2022.00015","DOIUrl":null,"url":null,"abstract":"To achieve data sharing model in clouds under modern technology, several attribute-based encryption schemes have been proposed in many different ways. attribute-based encryption (ABE) is a one-to-many, fine-grained access control mechanism. Based on elliptic curve cryptography, we can reduce the computation overhead. However, most of these ABE schemes over elliptic curves are insecure or lacking of security proofs. In this manuscript, we review on the revocable multi-authority attribute-based encryption proposed by Ming et al.'s in 2021 and give the cryptanalysis on their scheme. More specifically, we demonstrate an attacking method to their scheme. Our attack allows any two users owning a same attribute colluding with each other, to generate private key of any chosen attribute set.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption\",\"authors\":\"Yi-Fan Tseng, Hao Yang, Chieh-Han Wu, Tsung-Yu Chien, R. Tso, Zi-Yuan Liu, Jen-Chieh Hsu\",\"doi\":\"10.1109/AsiaJCIS57030.2022.00015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To achieve data sharing model in clouds under modern technology, several attribute-based encryption schemes have been proposed in many different ways. attribute-based encryption (ABE) is a one-to-many, fine-grained access control mechanism. Based on elliptic curve cryptography, we can reduce the computation overhead. However, most of these ABE schemes over elliptic curves are insecure or lacking of security proofs. In this manuscript, we review on the revocable multi-authority attribute-based encryption proposed by Ming et al.'s in 2021 and give the cryptanalysis on their scheme. More specifically, we demonstrate an attacking method to their scheme. Our attack allows any two users owning a same attribute colluding with each other, to generate private key of any chosen attribute set.\",\"PeriodicalId\":304383,\"journal\":{\"name\":\"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS57030.2022.00015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS57030.2022.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption
To achieve data sharing model in clouds under modern technology, several attribute-based encryption schemes have been proposed in many different ways. attribute-based encryption (ABE) is a one-to-many, fine-grained access control mechanism. Based on elliptic curve cryptography, we can reduce the computation overhead. However, most of these ABE schemes over elliptic curves are insecure or lacking of security proofs. In this manuscript, we review on the revocable multi-authority attribute-based encryption proposed by Ming et al.'s in 2021 and give the cryptanalysis on their scheme. More specifically, we demonstrate an attacking method to their scheme. Our attack allows any two users owning a same attribute colluding with each other, to generate private key of any chosen attribute set.