Skip to main content
Log in

A flaw in the security proof of BDOP-PEKS and PEKS-STAT

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP-PEKS, and give a security proof. The flaw in the security proof of PEKS-STAT can be fixed in the same way. Finally we conclude some steps of security proof, and emphasize that the probability is as important as the construction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bellare M. Practice-Oriented Provable Security[C]// ISW’97, LNCS 396. Berlin: Springer-Verlag, 1997: 221–231.

    Google Scholar 

  2. Pointcheval D. Advanced Course on Contemporary Cryptology[M]. Basel: Birkhuser Publishers, 2005.

    Google Scholar 

  3. Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public Key Encryption with Keyword Search [C]//EUROCRYPT 2004, LNCS 3027. Berlin: Springer-Verlag, 2004:506–522.

    Google Scholar 

  4. Abdalla M, Bellare M. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions[C]//CRYPTO 2005, LNCS 3621. Berlin: Springer-Verlag, 2005:205–222.

    Google Scholar 

  5. Boneh D, Frankin M. Identity-Based Encryption from Weil Pairing[J]. SIAM J of Computing, 2003,32(3): 586–615.

    Article  Google Scholar 

  6. Okamoto T, Pointcheval D. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes[C]//PKC2001, LNCS 1992. Berlin: Springer-Verlag, 2001: 104–118.

    Google Scholar 

  7. Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, IT-22(6): 644–654.

    Article  Google Scholar 

  8. Bellare M, Desai A, Pointcheval D, et al. Relations among Notions of Security for Public-Key Encryption Schemes[C]// Cryto’98, LNCS 1462. Berlin: Springer-Verlag, 1998:26–45.

    Google Scholar 

  9. Boneh D, Lipton R J. Algorithms for Black-Box Fields and Their Application to Cryptography[C]//Crypto’96, LNCS 1109. Berlin: Springer-Verlag, 1996:283–297.

    Google Scholar 

  10. Dwork C, Naor M. An Efficient Existentially Unforgeable Signature Scheme and Its Applications[J]. J of Cryptology, 1998, 11(3): 187–208.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhu Yuefei.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60473021)

Biography: ZHANG Yajuan(1974–), female, Ph.D., research direction: cryptography.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Zhu, Y., Gu, C. et al. A flaw in the security proof of BDOP-PEKS and PEKS-STAT. Wuhan Univ. J. of Nat. Sci. 12, 25–28 (2007). https://doi.org/10.1007/s11859-006-0157-3

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-006-0157-3

Key words

CLC number

Navigation