In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data.
References
Link | Resource |
---|---|
https://www2.hci.uni-hannover.de/papers/Tan2019.pdf | Technical Description Third Party Advisory |
https://github.com/JHUISI/charm/issues/276 | Issue Tracking Third Party Advisory |
https://jhuisi.github.io/charm/charm/schemes/abenc/abenc_dacmacs_yj14.html | Third Party Advisory |
https://jhuisi.github.io/charm/_modules/abenc_maabe_yj14.html | Patch Third Party Advisory |
https://eprint.iacr.org/2020/460 | Third Party Advisory |
Configurations
Information
Published : 2021-07-30 07:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-37587
Mitre link : CVE-2021-37587
JSON object : View
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Products Affected
jhu
- charm