Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks

被引:1
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Karuturi, Naga Naresh [1 ]
Gopalakrishnan, Ragavendran [1 ]
Chandrasekaran, Pandu Rangan [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
关键词
D O I
10.1109/PST.2008.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadcast signcryption enables the broadcaster to simultaneously encrypt and sign the content meant or a specific set of users in a single logical step. It provides a very efficient solution to the dual problem of achieving confidentiality and authentication during content distribution. Among other alternatives, ID-based schemes are arguably the best suited for its implementation in wireless ad-hoc networks because of the unique advantage that they provide - any unique, publicly available parameter of a user can be his public key, which eliminates the need for a complex public key infrastructure. In 2004, Bohio et al. [4] proposed an ID-based broadcast signcryption (IBBSC) scheme which achieves constant ciphertext size. They claim that their scheme provides both message authentication and confidentiality, but do not give formal proofs. In this paper, we demonstrate how a legitimate user of the scheme can forge a valid signcrypted ciphertext, as if generated by the broadcaster Moreover; we show that their scheme is not IND-CCA secure. Following this, we propose a fix for Bohio et al.'s scheme, and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA). While fixing the scheme, we also improve its efficiency by reducing the ciphertext size to two elements compared to three in 14].
引用
收藏
页码:109 / 120
页数:12
相关论文
共 50 条
  • [1] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [2] On the security of Kim et al. two ID-based broadcast signcryption schemes
    Zhang, Jianhong
    Tang, Wenjing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1509 - 1514
  • [3] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [4] IdSRF: ID-based secure routing framework for wireless Ad-hoc networks
    Ren, Wei
    Kim, Yoohwan
    Jo, Ju-Yeon
    Yang, Mei
    Jiang, Yingtao
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 102 - +
  • [5] Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
    Zhang, Fangguo
    Chen, Xiaofeng
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (15) : 846 - 849
  • [6] Efficient ID-based Message Authentication with Enhanced Privacy in Wireless Ad-hoc Networks
    Li, Jian
    Liu, Yun
    Zhang, Zhenjiang
    Li, Bin
    Liu, Hui
    Cheng, Junjun
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 322 - 326
  • [7] Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
    Li, Fagen
    Shirase, Masaaki
    Takag, Tsuyoshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 289 - +
  • [8] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04): : 799 - 810
  • [9] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [10] A Reachable and Fault Tolerant Scheme for Broadcast in Ad-Hoc Wireless Networks
    Wu, Fan
    Li, Hsiao-Hui
    Wang, Yao-Tien
    Tsai, Ming-Lun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (01): : 71 - 80