Cryptanalysis of Two Ring Signcryption Schemes

被引:0
|
作者
Wang, Huaqun [1 ]
Yu, Hong [1 ]
机构
[1] Dalian Fisheries Univ, Sch Informat Engn, Dalian, Peoples R China
来源
关键词
Ring signcryption; privacy and trust; cryptanalysis; certificateless cryptography; SIGNATURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ring signcryption scheme is an important cryptographic primitive that can be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth. In this paper,we analyze two ring signcryption schemes:Wang-Zhang-Ma's scheme (2007) and Zhu-Zhang-Wang's scheme (2008). We give different attack methods to the above two ring signcryption schemes. There exist Malicious KGC attack and Non-repudiation attack on Wang-Zhang-Ma's scheme (2007). There exist anonymity attack and existential unforgeability attack on Zhu-Zhang-Wang's scheme.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 50 条
  • [21] Two proxy signcryption schemes from bilinear pairings
    Wang, Q
    Cao, ZF
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 161 - 171
  • [22] Efficient Constructions of Signcryption Schemes and Signcryption Composability
    Matsuda, Takahiro
    Matsuura, Kanta
    Schuldt, Jacob C. N.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
  • [23] Signcryption schemes with anonymity
    Wei B.
    Ou H.
    Tian H.
    Gao C.
    International Journal of Advancements in Computing Technology, 2011, 3 (08) : 127 - 137
  • [24] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [25] Cryptanalysis of two multisignature schemes with distinguished signing authorities
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 492 - +
  • [26] Cryptanalysis of a certificateless signcryption scheme in the standard model
    Weng, Jian
    Yao, Guoxiang
    Deng, Robert H.
    Chen, Min-Rong
    Li, Xiangxue
    INFORMATION SCIENCES, 2011, 181 (03) : 661 - 667
  • [27] Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FUNDAMENTA INFORMATICAE, 2011, 109 (02) : 189 - 200
  • [28] Cryptanalysis and improvement of a signcryption scheme with public verifiability
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Tien Tzu Hsueh Pao, 2006, 1 (177-179):
  • [29] Improved Cryptanalysis of Provable Certificateless Generalized Signcryption
    Waheed, Abdul
    Iqbal, Jawaid
    Din, Nizamud
    Ul Islam, Shahab
    Umar, Arif Iqbal
    Ul Amin, Noor
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (04) : 610 - 616
  • [30] Cryptanalysis of Two Signature Schemes for IoT and Mobile Health Systems
    Feihong Xu
    Hui Zeng
    Wireless Personal Communications, 2022, 122 : 2035 - 2043