Cryptanalysis of two identity-based signcryption schemes

被引:0
|
作者
Wang, Huaqun [1 ]
Zhang, Yuqing [1 ]
机构
[1] GUCAS, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
关键词
signcryption; identity-based cryptography; cryptanalysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity. In the last few years, a new separate primitive - called signcryption - has emerged to model a process simultaneously achieving privacy and authenticity. In this paper, we analyze two signcryption schemes: Yu-Yang-Sun-Zhu's scheme (2007) and Li-Xin-Hu's scheme (2008). To Yu-Yang-Sun-Zhu's scheme (2007), we give two attack methods that correspond to the semantic security and existential unforgeability. To Li-Xin-Hu's scheme (2008), we show that the scheme can be broken by the attacker. Besides the receivers, the attacker can also decrypt any ciphertexts. The receiver can find the targeted master secret key.
引用
收藏
页码:694 / 698
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis of Two Identity Based Signcryption Schemes
    Xia, Qi
    Xu, Chunxiang
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
  • [2] Identity-based proxy signcryption schemes
    Jian, Wu
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [3] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [4] A computational review of identity-based signcryption schemes
    Mandal, Murari
    Sharma, Gaurav
    Verma, Anil K.
    [J]. International Journal of Network Security, 2016, 18 (05) : 969 - 977
  • [5] Cryptanalysis of Two Ring Signcryption Schemes
    Wang, Huaqun
    Yu, Hong
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 41 - 46
  • [6] Identity-Based Hybrid Signcryption
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 534 - +
  • [7] Identity-Based Transitive Signcryption
    Hou, Shuquan
    Huang, Xinyi
    Xu, Li
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 246 - 259
  • [8] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    [J]. IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272
  • [9] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [10] Analysis and improvement of an identity-based signcryption
    Zhang, Yu
    Du, Rui-Ying
    Chen, Jing
    Hou, Jian
    Zhou, Qing
    Wang, Wen-Wu
    [J]. Tongxin Xuebao/Journal on Communications, 2015, 36 (11):