Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks

被引:1
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Karuturi, Naga Naresh [1 ]
Gopalakrishnan, Ragavendran [1 ]
Chandrasekaran, Pandu Rangan [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
关键词
D O I
10.1109/PST.2008.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadcast signcryption enables the broadcaster to simultaneously encrypt and sign the content meant or a specific set of users in a single logical step. It provides a very efficient solution to the dual problem of achieving confidentiality and authentication during content distribution. Among other alternatives, ID-based schemes are arguably the best suited for its implementation in wireless ad-hoc networks because of the unique advantage that they provide - any unique, publicly available parameter of a user can be his public key, which eliminates the need for a complex public key infrastructure. In 2004, Bohio et al. [4] proposed an ID-based broadcast signcryption (IBBSC) scheme which achieves constant ciphertext size. They claim that their scheme provides both message authentication and confidentiality, but do not give formal proofs. In this paper, we demonstrate how a legitimate user of the scheme can forge a valid signcrypted ciphertext, as if generated by the broadcaster Moreover; we show that their scheme is not IND-CCA secure. Following this, we propose a fix for Bohio et al.'s scheme, and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA). While fixing the scheme, we also improve its efficiency by reducing the ciphertext size to two elements compared to three in 14].
引用
收藏
页码:109 / 120
页数:12
相关论文
共 50 条
  • [41] Design and implementation of a MAC scheme for wireless ad-hoc networks based on a cooperative game framework
    Fang, ZY
    Bensaou, B
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 4034 - 4038
  • [42] Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes
    Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China
    [J]. Int. J. Intell. Inf. Database Syst., 2013, 5 (400-413):
  • [43] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
  • [44] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card
    Chen, Chin-Ling
    Deng, Yong-Yuan
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
  • [45] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
    Sun, HM
    Hsieh, BT
    Tseng, SM
    [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
  • [46] LAAP: A Learning Automata-based Adaptive Polling Scheme for Clustered Wireless Ad-Hoc Networks
    Javad Akbari Torkestani
    [J]. Wireless Personal Communications, 2013, 69 : 841 - 855
  • [47] LAAP: A Learning Automata-based Adaptive Polling Scheme for Clustered Wireless Ad-Hoc Networks
    Torkestani, Javad Akbari
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (02) : 841 - 855
  • [48] A bi-modal ad-hoc Localization Scheme for Wireless Networks based on RSS and ToF Fusion
    Gaedeke, Tobias
    Schmid, Johannes
    Krueger, Marcel
    Jany, Josefin
    Stork, Wilhelm
    Mueller-Glaser, Klaus D.
    [J]. 2013 10TH WORKSHOP ON POSITIONING, NAVIGATION AND COMMUNICATION (WPNC), 2013,
  • [49] Improvement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem
    Wang, Changji
    Li, Qin
    Yang, Xingfeng
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 161 - 165
  • [50] An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks
    V. S. Janani
    M. S. K. Manikandan
    [J]. Wireless Personal Communications, 2019, 105 : 857 - 876