<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf23207</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2012.361</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Wang</surname>
						<given-names>Xu An</given-names>
					</name>
					<email xlink:href="mailto:wangxahq@yahoo.com.cn">wangxahq@yahoo.com.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Yang</surname>
						<given-names>Xiaoyuan</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Zhang</surname>
						<given-names>Minqing</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Yu</surname>
						<given-names>Yong</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi'an 710086, P.R. China</aff>
				<aff id="j_INFORMATICA_aff_001">School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P.R. China</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2012</year>
			</pub-date>
			<volume>23</volume>
			<issue>2</issue>
			<fpage>299</fpage>
			<lpage>314</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>10</month>
					<year>2010</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>12</month>
					<year>2011</year>
				</date>
			</history>
			<abstract>
				<p>Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w' if and only if w is close enough to w'. Recently, Ren et al. proposed a new FIBE scheme and claimed it is fully CCA2 secure in the standard model with a tight reduction. However, in this paper we will show that their scheme is not correct. Furthermore, the key generation process of their scheme cannot resist the collusion attack, which is a basic security requirement for FIBE. At last, we propose a new fully secure FIBE scheme based on the Sahai–Waters FIBE scheme and prove its security by using the “dual system encryption” technique.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>cryptography</kwd>
				<kwd>fuzzy identity based encryption</kwd>
				<kwd>fully secure</kwd>
				<kwd>CCA2-secure</kwd>
				<kwd>attack</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>