Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme

被引:3
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Rangan, C. Pandu [1 ]
Jain, Neha [2 ]
机构
[1] Indian Inst Technol, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci, Vellore 632014, Tamil Nadu, India
关键词
D O I
10.1109/EUC.2008.187
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu. They have proved the confidentiality of their scheme and have also claimed the unforgeability without providing satisfactory proof In this paper; we show that in their signcryption scheme the secret key of the sender is exposed(total break) to the clerk during signcryption and hence insecure in the presence of malicious clerks. Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [41] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [42] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359
  • [43] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [44] Revocable identity-based signcryption scheme without random oracles
    Zhang, Xiangsong
    Liu, Zhenhua
    Hu, Yupu
    Takagi, Tsuyoshi
    International Journal of Network Security, 2015, 17 (02) : 110 - 122
  • [45] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [46] Further improvement of an identity-based signcryption scheme in the standard model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    Takagi, Tsuyoshi
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 413 - 421
  • [47] Efficient identity-based multi-recipient signcryption scheme
    Du, Hong-Zhen
    Wen, Qiao-Yan
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 127 - 131
  • [48] Identity-Based Broadcast Signcryption Scheme for Vehicular Platoon Communication
    Zhao, Yanan
    Wang, Yunpeng
    Liang, Yuhao
    Yu, Haiyang
    Ren, Yilong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (06) : 7814 - 7824
  • [49] An identity-based signcryption scheme with short ciphertext from pairings
    Chen, Huiyan
    Lu, Shuwang
    Liu, Zhenhua
    Chen, Qing
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 342 - 351
  • [50] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097