>
Fa   |   Ar   |   En
   security weaknesses of some policy-hiding attribute-based encryption schemes  
   
نویسنده sotoudeh reihaneh ,eghlidos taraneh ,mohajeri javad
منبع the isc international journal of information security - 2025 - دوره : 17 - شماره : 2 - صفحه:171 -178
چکیده    In ciphertext-policy attribute-based encryption (cp-abe) schemes, an access structure is sent with each ciphertext to specify the intended recipients. this design can reveal sensitive information about the encrypted data and its recipients. moreover, it may introduce new security concerns regarding user privacy. policy-hiding cp-abe schemes have been proposed to address this challenge and protect user privacy. in this paper, we present the cryptanalysis of two policy-hiding cp-abe schemes. for the first scheme, we demonstrate that it leaks attribute value information through the ciphertext. an adversary can exploit this flaw to perform an offline dictionary attack, revealing the attribute values used in the access structure, and thereby exposing the entire access structure. for the second scheme, we show that its security is compromised due to the improper establishment of the decryption key component utilized in the attribute matching phase. data users can exploit the secret key components used in the attribute matching phase to decrypt any ciphertext, regardless of their attribute set.
کلیدواژه ciphertext-policy attribute-based encryption ,hidden-policy ciphertext-policy attribute-based encryption ,offline dictionary attack ,attribute matching
آدرس sharif university of technology, department of electrical engineering, iran, sharif university of technology, electronics research institute, iran, sharif university of technology, electronics research institute, iran
پست الکترونیکی mohajer@sharig.edu
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved