{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:28:23Z","timestamp":1742801303635},"reference-count":2,"publisher":"World Scientific Pub Co Pte Lt","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2014,3]]},"abstract":"<jats:p>Fuzzy identity-based encryption (FIBE) scheme is a kind of identity-based encryption (IBE) scheme, in which any user's identity is composed by a set of attributes and any ciphertext encrypted under identity ID can be decrypted by using a private key corresponding to identity ID\u2032 if ID\u2032 is close to ID as measured by some metric. Due to the error-tolerance property, FIBE scheme is very useful in real-world applications. However, most FIBE schemes are provable secure only in a weaker security model. In order to eliminate this problem, Ren et al. recently proposed a new FIBE scheme and proved that it is fully chosen-ciphertext secure in the standard model. Unfortunately, in this paper, we will show that their FIBE scheme is even not chosen-plaintext secure.<\/jats:p>","DOI":"10.1142\/s0218126614500339","type":"journal-article","created":{"date-parts":[[2013,12,26]],"date-time":"2013-12-26T12:30:47Z","timestamp":1388061047000},"page":"1450033","source":"Crossref","is-referenced-by-count":3,"title":["SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME"],"prefix":"10.1142","volume":"23","author":[{"given":"MIAOMIAO","family":"TIAN","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, No. 96, Jinzhai Road, Hefei 230026, P. R. China"},{"name":"Suzhou Institute for Advanced Study, University of Science and Technology of China, No. 166, Renai Road, Suzhou 215123, P. R. China"}]},{"given":"LIUSHENG","family":"HUANG","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, No. 96, Jinzhai Road, Hefei 230026, P. R. China"},{"name":"Suzhou Institute for Advanced Study, University of Science and Technology of China, No. 166, Renai Road, Suzhou 215123, P. R. China"}]},{"given":"WEI","family":"YANG","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, No. 96, Jinzhai Road, Hefei 230026, P. R. China"},{"name":"Suzhou Institute for Advanced Study, University of Science and Technology of China, No. 166, Renai Road, Suzhou 215123, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2014,3,2]]},"reference":[{"key":"rf6","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"Pirretti M.","journal-title":"J. Comput. Sec."},{"key":"rf10","doi-asserted-by":"crossref","first-page":"393","DOI":"10.15388\/Informatica.2010.296","volume":"21","author":"Ren Y.","journal-title":"Informatica"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126614500339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T22:13:40Z","timestamp":1597270420000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126614500339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":2,"journal-issue":{"issue":"03","published-online":{"date-parts":[[2014,3,2]]},"published-print":{"date-parts":[[2014,3]]}},"alternative-id":["10.1142\/S0218126614500339"],"URL":"https:\/\/doi.org\/10.1142\/s0218126614500339","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]}}}