Cryptanalysis of Two Ring Signcryption Schemes

被引:0
|
作者
Wang, Huaqun [1 ]
Yu, Hong [1 ]
机构
[1] Dalian Fisheries Univ, Sch Informat Engn, Dalian, Peoples R China
来源
关键词
Ring signcryption; privacy and trust; cryptanalysis; certificateless cryptography; SIGNATURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ring signcryption scheme is an important cryptographic primitive that can be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth. In this paper,we analyze two ring signcryption schemes:Wang-Zhang-Ma's scheme (2007) and Zhu-Zhang-Wang's scheme (2008). We give different attack methods to the above two ring signcryption schemes. There exist Malicious KGC attack and Non-repudiation attack on Wang-Zhang-Ma's scheme (2007). There exist anonymity attack and existential unforgeability attack on Zhu-Zhang-Wang's scheme.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 50 条
  • [1] Cryptanalysis of Two Identity Based Signcryption Schemes
    Xia, Qi
    Xu, Chunxiang
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
  • [2] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [3] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [4] ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
    Vivek, S. Sree
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 219 - 224
  • [5] Cryptanalysis of a Certificateless Ring Signcryption Scheme
    Du, Hongzhen
    Wen, Qiaoyan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 329 - 336
  • [7] Cryptanalysis of attribute-based ring signcryption scheme
    Xiong, Hu
    Geng, Ji
    Qin, Zhiguang
    Zhu, Guobin
    International Journal of Network Security, 2015, 17 (02) : 224 - 228
  • [8] Cryptoanalysis of Two Signcryption Schemes
    Zhang, Jianhong
    Geng, Qin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 65 - 68
  • [9] Cryptanalysis of Certificate less Signcryption Schemes and an Efficient Construction without Pairing
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 75 - 92
  • [10] On the Security of Identity Based Ring Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325