{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:41:28Z","timestamp":1648870888739},"reference-count":33,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2019,6]]},"abstract":"<jats:p> In 2010, Fan et al. first introduced the concept of anonymous multi-receiver identity-based encryption (AMRIBE). They used the concept of Fujisaki\u2013Okamoto transformation (F.O. transformation) to support their proof in random oracle models. Recently, many works on this topic have been proposed. Most of them adopted Fujisaki\u2013Okamoto transformation to achieve the indistinguishability of encryptions under multi-ID, chosen-ciphertext attacks (IND-MID-CCA) security. However, we find out that these schemes do not gain anonymity against insider attacks. In this manuscript, we use a sequence of games to prove that any AMRIBE scheme will fail to gain anonymity under chosen-ciphertext attacks and chosen-plaintext attacks if the IND-MID-CCA security is proven using Fujisaki\u2013Okamoto transformation. <\/jats:p>","DOI":"10.1142\/s0129054119400094","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:51:21Z","timestamp":1562115081000},"page":"493-509","source":"Crossref","is-referenced-by-count":0,"title":["On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki\u2013Okamoto Transformation"],"prefix":"10.1142","volume":"30","author":[{"given":"Yi-Fan","family":"Tseng","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan"}]},{"given":"Chun-I","family":"Fan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan"}]},{"given":"Cheng-Wei","family":"Sung","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan"}]}],"member":"219","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"S0129054119400094BIB002","first-page":"270","volume":"14","author":"Chen Z.","year":"2012","journal-title":"Int. J. Netw. Sec."},{"key":"S0129054119400094BIB003","first-page":"285","volume":"16","author":"Chen Z.","year":"2014","journal-title":"Int. J. Netw. Sec."},{"key":"S0129054119400094BIB004","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr086"},{"key":"S0129054119400094BIB005","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"S0129054119400094BIB006","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2013.055038"},{"key":"S0129054119400094BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"S0129054119400094BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"S0129054119400094BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.23"},{"key":"S0129054119400094BIB010","doi-asserted-by":"publisher","DOI":"10.3390\/sym7041856"},{"key":"S0129054119400094BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"S0129054119400094BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9114-1"},{"key":"S0129054119400094BIB013","first-page":"307","volume":"15","author":"Harn L.","year":"2013","journal-title":"Int. J. Netw. Sec."},{"key":"S0129054119400094BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_13"},{"key":"S0129054119400094BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.03.003"},{"key":"S0129054119400094BIB016","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0354"},{"key":"S0129054119400094BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.006"},{"key":"S0129054119400094BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"S0129054119400094BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2283848"},{"key":"S0129054119400094BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2013.70"},{"key":"S0129054119400094BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34135-9_28"},{"key":"S0129054119400094BIB022","first-page":"89","volume":"22","author":"Pang L.","year":"2013","journal-title":"Chinese J. Electron."},{"key":"S0129054119400094BIB023","first-page":"256","volume":"16","author":"Ren Y.","year":"2014","journal-title":"Int. J. Netw. Sec."},{"key":"S0129054119400094BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"S0129054119400094BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.50"},{"key":"S0129054119400094BIB027","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2395"},{"key":"S0129054119400094BIB028","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt052"},{"key":"S0129054119400094BIB029","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0252"},{"key":"S0129054119400094BIB030","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"S0129054119400094BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2759329"},{"key":"S0129054119400094BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"S0129054119400094BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.117"},{"key":"S0129054119400094BIB035","first-page":"400","volume":"7","author":"Zhang J.","year":"2013","journal-title":"Int. J. Intell. Inform. Database Syst."},{"key":"S0129054119400094BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221893"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054119400094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:25:50Z","timestamp":1565119550000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054119400094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":33,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2019,7,2]]},"published-print":{"date-parts":[[2019,6]]}},"alternative-id":["10.1142\/S0129054119400094"],"URL":"https:\/\/doi.org\/10.1142\/s0129054119400094","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}