Security analysis of signcryption scheme from q-Diffie-Hellman problems

被引:6
作者
Tan, CH [1 ]
机构
[1] Gjovik Univ Coll, Dept Comp Sci & Media Technol, NISlab, Gjovik, Norway
来源
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 2006年 / E89A卷 / 01期
关键词
cryptography; signcryption;
D O I
10.1093/ietfec/e89-a.1.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyse the Libert-Quisquater's q-DH signcryption scheme proposed in SCN'2004. Although the paper proved that their scheme is secure against adaptive chosen ciphertext attacks in the random oracle model, we disprove their claim and show that their scheme is not even secure against non-adaptive chosen ciphtertext attacks, which is the weaker security than the adaptive chosen ciphertext attacks. We further show that the semantically secure symmetric encryption scheme defined in their paper is not sufficient to guarantee their signcryption scheme to be secure against adaptive chosen ciphertext attacks.
引用
收藏
页码:206 / 208
页数:3
相关论文
共 10 条
[1]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]  
BAEK J, 2002, LECT NOTES COMPUTER, V2274, P80, DOI DOI 10.1007/S00145-007-0211_0
[3]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[4]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[5]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[6]  
Goldreich Oded, 2004, FDN CRYPTOGRAPHY BAS, V2
[7]  
Libert B, 2005, LECT NOTES COMPUT SC, V3352, P220
[8]  
Libert B, 2004, LECT NOTES COMPUT SC, V2947, P187
[9]   On the security of signcryption scheme with key privacy [J].
Tan, CH .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (04) :1093-1095
[10]  
Zheng YL, 1997, LECT NOTES COMPUT SC, V1294, P165