{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T02:43:39Z","timestamp":1648781019967},"reference-count":19,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T00:00:00Z","timestamp":1545264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"name":"Chinese Ministry of Education, Humanities and Social Sciences Research Project","award":["14YJCZH136"],"award-info":[{"award-number":["14YJCZH136"]}]},{"name":"Philosophy and Social Sciences Planning Project of Qingdao","award":["QDSKL1701086"],"award-info":[{"award-number":["QDSKL1701086"]}]},{"name":"Open Project Program of the State Key Laboratory of Integrated Services Networks","award":["ISN19-14"],"award-info":[{"award-number":["ISN19-14"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recently, Zhang et al. proposed a new anonymous hierarchical identity-based encryption (anonymous HIBE) over prime order groups to achieve both constant size private key and constant size ciphertext. Moreover, a double exponent technique was used to provide anonymity. They proved that their scheme is secure and anonymous against chosen plaintext attacks in the standard model. In this paper, we point out that their scheme is insecure.<\/jats:p>","DOI":"10.1093\/comjnl\/bxy130","type":"journal-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T12:09:14Z","timestamp":1542888554000},"page":"1087-1091","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys"],"prefix":"10.1093","volume":"62","author":[{"given":"Xi-Jun","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao, PR China"},{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, PR China"}]},{"given":"Lin","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Liberal Arts, Qingdao University. Qingdao, PR China"}]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao, PR China"}]},{"given":"He-Qun","family":"Xian","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Qingdao University, Qingdao, China"},{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an, PR China"}]}],"member":"286","published-online":{"date-parts":[[2018,12,20]]},"reference":[{"key":"2019081511250051200_bxy130C1","author":"Abdalla","year":"2005"},{"key":"2019081511250051200_bxy130C2","author":"Boneh","year":"2004"},{"key":"2019081511250051200_bxy130C3","author":"Boneh","year":"2005"},{"key":"2019081511250051200_bxy130C4","author":"Boneh","year":"2004"},{"key":"2019081511250051200_bxy130C5","author":"Boneh","year":"2001"},{"key":"2019081511250051200_bxy130C6","author":"Boyen","year":"2006"},{"key":"2019081511250051200_bxy130C7","author":"Caro","year":"2010"},{"key":"2019081511250051200_bxy130C8","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1093\/comjnl\/bxr086","article-title":"Improved anonymous multi-receiver identity-based encryption","volume":"55","author":"Chien","year":"2012","journal-title":"Comput. J."},{"key":"2019081511250051200_bxy130C9","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","article-title":"Identity-based key agreement protocols from pairings","volume":"6","author":"Chen","year":"2007","journal-title":"Int. J. Inf. Secur."},{"key":"2019081511250051200_bxy130C10","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","article-title":"Pairings for cryptographers","volume":"156","author":"Galbraith","year":"2008","journal-title":"Discrete Appl. Math."},{"key":"2019081511250051200_bxy130C11","author":"Gentry","year":"2002"},{"key":"2019081511250051200_bxy130C12","author":"Seo","year":"2009"},{"key":"2019081511250051200_bxy130C13","author":"Shamir","year":"1984"},{"key":"2019081511250051200_bxy130C14","author":"Shi","year":"2008"},{"key":"2019081511250051200_bxy130C15","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1093\/comjnl\/bxr098","article-title":"Efficient revocable ID-based encryption with a public channel","volume":"55","author":"Tseng","year":"2012","journal-title":"Comput. J."},{"key":"2019081511250051200_bxy130C16","doi-asserted-by":"crossref","first-page":"481","DOI":"10.15388\/Informatica.2012.371","article-title":"A fully secure revocable ID-based encryption in the standard model","volume":"23","author":"Tsai","year":"2012","journal-title":"Informatica"},{"key":"2019081511250051200_bxy130C17","author":"Waters","year":"2005"},{"key":"2019081511250051200_bxy130C18","doi-asserted-by":"crossref","first-page":"2994","DOI":"10.1016\/j.comnet.2012.05.011","article-title":"A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants","volume":"56","author":"Wu","year":"2012","journal-title":"Comput. Netw."},{"key":"2019081511250051200_bxy130C19","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1093\/comjnl\/bxv059","article-title":"Compact anonymous hierarchical identity-based encryption with constant size private keys","volume":"59","author":"Zhang","year":"2016","journal-title":"Comput. J."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/62\/8\/1087\/29162291\/bxy130.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T19:44:45Z","timestamp":1605469485000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/62\/8\/1087\/5253748"}},"subtitle":[],"editor":[{"given":"Chris","family":"Mitchell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,12,20]]},"references-count":19,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,12,20]]},"published-print":{"date-parts":[[2019,8,9]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy130","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019,8]]},"published":{"date-parts":[[2018,12,20]]}}}