Analysis and improvement of authenticatable ring signcryption scheme

被引:9
作者
Li F.-G. [1 ,2 ,3 ]
Masaaki S. [3 ]
Tsuyoshi T. [3 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China
[2] State Key Laboratory of Information Security, Graduate School, Chinese Academy of Sciences
[3] School of Systems Information Science, Future University-Hakodate
基金
中国国家自然科学基金;
关键词
Bilinear pairings; Identity-based cryptography; Ring signature; Ring signcryption;
D O I
10.1007/s12204-008-0679-2
中图分类号
学科分类号
摘要
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks. Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme. The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme. We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability. Copyright.
引用
收藏
页码:679 / 683
页数:4
相关论文
共 9 条
[1]  
Zheng Y., Digital signcryption or how to achieve cost (signature & encryption) ≪cost (signature) + Cost (encryption), Proc Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, (1997)
[2]  
Shamir A., Identity-based cryptosystems and signature Schemes, Proc. Advances in Cryptology-CRYPTO'84, LNCS 196, pp. 47-53, (1984)
[3]  
Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proc Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, (2001)
[4]  
Rivest R.L., Shamir A., Tauman Y., How to leak a secret, Proc Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, pp. 552-565, (2001)
[5]  
Zhang F., Kim K., ID-based blind signature and ring signature from pairings, Proc Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, pp. 533-547, (2002)
[6]  
Huang X., Susilo W., Mu Y., Zhang F., Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world, Proc Advanced Information Networking and Applications-AINA 2005, pp. 649-654, (2005)
[7]  
Zhang M., Yang B., Zhu S., Et al., Efficient secret authenticatable anonymous signcryption scheme with identity privacy, Proc Intelligence and Security Informatics-ISI 2008, LNCS 5075, pp. 126-137, (2008)
[8]  
An J.H., Dodis Y., Rabin T., On the security of joint signature and encryption, Proc Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp. 83-107, (2002)
[9]  
Li F., Shirase M., Takagi T., Analysis and improvement of authenticatable ring signcryption scheme, (2008)