Cryptanalysis of Two Ring Signcryption Schemes

被引:0
|
作者
Wang, Huaqun [1 ]
Yu, Hong [1 ]
机构
[1] Dalian Fisheries Univ, Sch Informat Engn, Dalian, Peoples R China
来源
关键词
Ring signcryption; privacy and trust; cryptanalysis; certificateless cryptography; SIGNATURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ring signcryption scheme is an important cryptographic primitive that can be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth. In this paper,we analyze two ring signcryption schemes:Wang-Zhang-Ma's scheme (2007) and Zhu-Zhang-Wang's scheme (2008). We give different attack methods to the above two ring signcryption schemes. There exist Malicious KGC attack and Non-repudiation attack on Wang-Zhang-Ma's scheme (2007). There exist anonymity attack and existential unforgeability attack on Zhu-Zhang-Wang's scheme.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 50 条
  • [41] Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation
    Yen, Sung-Ming
    Wang, Jian-Hong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [42] Cryptanalysis of an identity based signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    International Journal of Network Security, 2016, 18 (01) : 165 - 171
  • [43] Cryptanalysis of an Identity Based Signcryption without Random Oracles
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    FUNDAMENTA INFORMATICAE, 2011, 107 (01) : 105 - 109
  • [44] Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme
    Lin, Xi-Jun (linxj77@163.com), 1600, Oxford University Press (61):
  • [45] Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
    Shim, Kyung-Ah
    An, Youngjoo
    IEEE ACCESS, 2021, 9 : 134427 - 134434
  • [46] Cryptanalysis and improvement of Petersen-Michels signcryption scheme
    He, WH
    Wu, TC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (02): : 123 - 124
  • [47] Strongly Secure Certificate less Signature: Cryptanalysis and Improvement of Two Schemes
    Chen, Yu-Chi
    Tso, Raylin
    Horng, Gowboa
    Fan, Chun-I
    Hsu, Ruei-Hau
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 297 - 314
  • [48] Cryptanalysis of two similar chaos-based image encryption schemes
    Mastan, J. Mohamedmoideen Kader
    Pandian, R.
    CRYPTOLOGIA, 2021, 45 (06) : 541 - 552
  • [49] Construction of Identity Based Signcryption Schemes
    Pandey, Sumit Kumar
    Barua, Rana
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
  • [50] Identity Based Aggregate Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Shriram, J.
    Kalaivani, S.
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 378 - +