Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme

被引:3
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Rangan, C. Pandu [1 ]
Jain, Neha [2 ]
机构
[1] Indian Inst Technol, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci, Vellore 632014, Tamil Nadu, India
关键词
D O I
10.1109/EUC.2008.187
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu. They have proved the confidentiality of their scheme and have also claimed the unforgeability without providing satisfactory proof In this paper; we show that in their signcryption scheme the secret key of the sender is exposed(total break) to the clerk during signcryption and hence insecure in the presence of malicious clerks. Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [2] Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme
    Li, Huixian
    Pang, Liaojun
    IET INFORMATION SECURITY, 2014, 8 (01) : 8 - 11
  • [3] An identity-based threshold signcryption scheme with semantic security
    Peng, CG
    Li, X
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 173 - 179
  • [4] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [5] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [6] Identity-based multi-receiver threshold signcryption scheme
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1331 - 1337
  • [7] A provable secure identity-based threshold proxy signcryption scheme
    Hu, D. (hdf666@163.com), 2013, CESER Publications, Post Box No. 113, Roorkee, 247667, India (51):
  • [8] Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles
    Lee, Hyung Tae
    IEEE ACCESS, 2023, 11 : 84533 - 84542
  • [9] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [10] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489