Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme

被引:3
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Rangan, C. Pandu [1 ]
Jain, Neha [2 ]
机构
[1] Indian Inst Technol, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci, Vellore 632014, Tamil Nadu, India
关键词
D O I
10.1109/EUC.2008.187
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu. They have proved the confidentiality of their scheme and have also claimed the unforgeability without providing satisfactory proof In this paper; we show that in their signcryption scheme the secret key of the sender is exposed(total break) to the clerk during signcryption and hence insecure in the presence of malicious clerks. Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [21] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [22] Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Karuturi, Naga Naresh
    Gopalakrishnan, Ragavendran
    Chandrasekaran, Pandu Rangan
    SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 109 - 120
  • [23] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [24] Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Wang, Hui
    JOURNAL OF COMPUTERS, 2012, 7 (06) : 1345 - 1352
  • [25] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 547 - 553
  • [26] Analysis of an Identity-Based Signcryption Scheme in the Standard Model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 268 - 269
  • [27] A Novel Identity-Based Multi-Signcryption Scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 28 - 28
  • [28] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [29] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Mao, Jian
    COMPUTER COMMUNICATIONS, 2009, 32 (01) : 14 - 18
  • [30] Identity-based key-insulated signcryption scheme
    Wang, Huige
    Cao, Hao
    Li, Desheng
    Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075