Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme

被引:0
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Gopalakrishnan, Ragavendran [1 ]
Karuturi, Naga Naresh [1 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
来源
关键词
Signcryption; Cryptanalysis; ID-based Cryptosystem; Broadcast Encryption; Provable Security; Random Oracle; Bilinear Pairing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In applications like wireless content distribution, a central authority needs to deliver encrypted data to a large number of recipients in such a way that only a privileged subset of users can decrypt it. In addition, to avert junk content or spam, subscribers must have source authentication with respect to their broadcasters. The limited memory and computational power of mobile devices, coupled with escalating costs of wireless bandwidth make efficiency a major concern. Broadcast signcryption, which enables the broadcaster to simultaneously encrypt and sign the content meant for a specific set of users in a single logical step, provides the most efficient solution to this dual problem of confidentiality and authentication. It is arguably most efficiently implemented in the ID-based setting because of its well known advantages. Only three IBBSC schemes exist in literature, one of which has already been shown to be flawed and its security leaks fixed. In this paper, we show that the remaining two - Mu et al.'s scheme and Li et al.'s scheme are also flawed. Specifically, we show that while Mu et al.'s scheme is insecure with respect to unforgeability, Li et al.'s scheme can be totally broken (with respect to both unforgeability and confidentiality). Following this, we propose a new IBBSC scheme and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA).
引用
收藏
页码:115 / 129
页数:15
相关论文
共 50 条
  • [1] Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Karuturi, Naga Naresh
    Gopalakrishnan, Ragavendran
    Chandrasekaran, Pandu Rangan
    [J]. SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 109 - 120
  • [2] On the security of Kim et al. two ID-based broadcast signcryption schemes
    Zhang, Jianhong
    Tang, Wenjing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1509 - 1514
  • [3] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [4] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [5] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [6] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [7] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Moon, Sangjae
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +
  • [8] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [9] Weakness in Jung et al.'s ID-based conference key distribution scheme
    Nam, J
    Kim, S
    Won, D
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 213 - 218
  • [10] Improvement on Meshram et al.'s ID-based cryptographic mechanism
    Pang, Liaojun
    Li, Huixian
    Pei, Qingqi
    Wang, Yumin
    [J]. INFORMATION PROCESSING LETTERS, 2013, 113 (19-21) : 789 - 792