Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme

被引:3
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Rangan, C. Pandu [1 ]
Jain, Neha [2 ]
机构
[1] Indian Inst Technol, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci, Vellore 632014, Tamil Nadu, India
关键词
D O I
10.1109/EUC.2008.187
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu. They have proved the confidentiality of their scheme and have also claimed the unforgeability without providing satisfactory proof In this paper; we show that in their signcryption scheme the secret key of the sender is exposed(total break) to the clerk during signcryption and hence insecure in the presence of malicious clerks. Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [31] An identity-based ring signcryption scheme in ideal lattice
    Sun, Yiru
    Zheng, Weimin
    Journal of Network Intelligence, 2018, 3 (03): : 152 - 161
  • [32] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [33] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Srinivasan, Rahul
    Rangan, Chandrasekaran Pandu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
  • [34] Efficient identity-based signcryption scheme for multiple receivers
    Yu, Yong
    Yang, Bo
    Huang, Xinyi
    Zhang, Mingwu
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
  • [35] Identity-based Group-recevier Signcryption scheme
    Zhang, Bo
    Shan, Shan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1986 - +
  • [36] A Fuzzy Identity-Based Signcryption Scheme from Lattices
    Lu, Xiuhua
    Wen, Qiaoyan
    Li, Wenmin
    Wang, Licheng
    Zhang, Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4203 - 4225
  • [37] Cryptanalysis of Barni et al. watermarking scheme
    Das, TK
    Zhou, JY
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
  • [38] Identity based threshold proxy signcryption scheme
    Wang, M
    Liu, ZJ
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
  • [39] Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption
    Waheed, Abdul
    Umar, Arif Iqbal
    Din, Nizamud
    Ul Amin, Noor
    Abdullah, Saleem
    Kumam, Poom
    MATHEMATICS, 2019, 7 (09)
  • [40] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card
    Chen, Chin-Ling
    Deng, Yong-Yuan
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,