Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves

被引:2
|
作者
LI Xiang-xue
机构
关键词
signcryption; elliptic curve; cryptanalysis;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement versions that not only overcome the security leak inherent in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-then-encryption methods.
引用
收藏
页码:231 / 234
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [2] Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls
    Zia, Malik
    Ali, Rashid
    PLOS ONE, 2018, 13 (12):
  • [4] How to construct efficient signcryption schemes on elliptic curves
    Zheng, YL
    Imai, H
    INFORMATION PROCESSING LETTERS, 1998, 68 (05) : 227 - 233
  • [5] Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve
    Zia, M.
    Ali, R.
    ELECTRONICS LETTERS, 2019, 55 (08) : 457 - 459
  • [6] Cryptanalysis of Two Ring Signcryption Schemes
    Wang, Huaqun
    Yu, Hong
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 41 - 46
  • [7] Improved Signcryption Schemes Based on Hyper-elliptic Curves Cryptosystem
    Zhou, Xuanwu
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 546 - 552
  • [8] Cryptanalysis of Two Identity Based Signcryption Schemes
    Xia, Qi
    Xu, Chunxiang
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
  • [9] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [10] Cryptanalysis and improvement of a signcryption scheme with public verifiability
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Tien Tzu Hsueh Pao, 2006, 1 (177-179):