Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme

被引:20
|
作者
Li, Huixian [1 ,2 ]
Pang, Liaojun [2 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Peoples R China
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
broadcasting; cryptography; receivers; telecommunication security; cryptanalysis; anonymous multireceiver identity-based encryption scheme; legal receiver; anonymity problem; Wang et al improved scheme;
D O I
10.1049/iet-ifs.2012.0354
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fan et al. proposed an anonymous multi-receiver identity-based encryption scheme in 2010, and showed that the identity of any legal receiver can be kept anonymous to anyone else. In 2012, Wang et al. pointed out that Fan et al.'s scheme cannot achieve the anonymity and that every legal receiver can determine whether the other is one of the legal receivers. At the same time, they proposed an improved scheme based on Fan et al.'s scheme to solve this anonymity problem. Unfortunately, the authors find that Wang et al.'s improved scheme still suffers from the same anonymity problem. Any legal receiver of Wang et al.'s improved scheme can judge whether anyone else is a legal receiver or not. In this study, the authors shall give the detailed anonymity analysis of Wang et al.'s improved scheme.
引用
收藏
页码:8 / 11
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    Wang, H.
    Zhang, Y.
    Xiong, H.
    Qin, B.
    IET INFORMATION SECURITY, 2012, 6 (01) : 20 - 27
  • [2] An improved anonymous multi-receiver identity-based encryption scheme
    Zhang, Jianhong
    Mao, Jian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 645 - 658
  • [3] Improved Anonymous Multi-receiver Identity-Based Encryption
    Chien, Hung-Yu
    COMPUTER JOURNAL, 2012, 55 (04): : 439 - 446
  • [4] Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes
    Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China
    Int. J. Intell. Inf. Database Syst., 2013, 5 (400-413):
  • [5] Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'
    Wang, Huaqun
    COMPUTER JOURNAL, 2014, 57 (04): : 636 - 638
  • [6] Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security
    Fan, Chun-I
    Tseng, Yi-Fan
    SYMMETRY-BASEL, 2015, 7 (04): : 1856 - 1881
  • [7] Improved identity based multi-receiver anonymous signcryption scheme
    School of Information Science and Engineering, University of Jinan, Jinan
    250022, China
    不详
    250022, China
    不详
    250101, China
    Tongxin Xuebao, 9 (109-118):
  • [8] Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext
    Wang, Huaqun
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 85 - 90
  • [9] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [10] Identity-based multi-receiver threshold signcryption scheme
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1331 - 1337