Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme

被引:20
|
作者
Li, Huixian [1 ,2 ]
Pang, Liaojun [2 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Peoples R China
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
broadcasting; cryptography; receivers; telecommunication security; cryptanalysis; anonymous multireceiver identity-based encryption scheme; legal receiver; anonymity problem; Wang et al improved scheme;
D O I
10.1049/iet-ifs.2012.0354
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fan et al. proposed an anonymous multi-receiver identity-based encryption scheme in 2010, and showed that the identity of any legal receiver can be kept anonymous to anyone else. In 2012, Wang et al. pointed out that Fan et al.'s scheme cannot achieve the anonymity and that every legal receiver can determine whether the other is one of the legal receivers. At the same time, they proposed an improved scheme based on Fan et al.'s scheme to solve this anonymity problem. Unfortunately, the authors find that Wang et al.'s improved scheme still suffers from the same anonymity problem. Any legal receiver of Wang et al.'s improved scheme can judge whether anyone else is a legal receiver or not. In this study, the authors shall give the detailed anonymity analysis of Wang et al.'s improved scheme.
引用
收藏
页码:8 / 11
页数:4
相关论文
共 50 条
  • [21] Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
    He, Debiao
    Wang, Huaqun
    Wang, Lina
    Shen, Jian
    Yang, Xianzhao
    SOFT COMPUTING, 2017, 21 (22) : 6801 - 6810
  • [22] Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
    Debiao He
    Huaqun Wang
    Lina Wang
    Jian Shen
    Xianzhao Yang
    Soft Computing, 2017, 21 : 6801 - 6810
  • [23] An Efficient Cloud-based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-Receiver Identity-Based Encryption
    Wang, Chang-Ji
    Xu, Xi-Lei
    Shi, Dong-Yuan
    Lin, Wen-Long
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 74 - 81
  • [24] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
  • [25] MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption
    Wang, Hongbing
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1641 - 1651
  • [26] Anonymous certificateless multi-receiver encryption scheme for smart community management systems
    Deng, Lunzhi
    SOFT COMPUTING, 2020, 24 (01) : 281 - 292
  • [27] Anonymous certificateless multi-receiver encryption scheme for smart community management systems
    Lunzhi Deng
    Soft Computing, 2020, 24 : 281 - 292
  • [28] Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement
    Liao, Yongjian
    Fan, Yu
    Liang, Yikuan
    Liu, Yulu
    Mohammed, Ramadan
    IEEE ACCESS, 2019, 7 : 75067 - 75072
  • [29] Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings
    Gao, Ronghai
    Zeng, Jiwen
    Deng, Lunzhi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [30] Privacy-preserving cloud-based personal health record system using attribute-based encryption and anonymous multi-receiver identity-based encryption
    Cisco School of Informatics, Guangdong University of Foreign Studies, Guangzhou
    510006, China
    不详
    510275, China
    Informatica, 4 (375-382):