Analysis of improved signcryption scheme with key privacy

被引:23
作者
Tan, CH [1 ]
机构
[1] Gjovik Univ Coll, NISlab, Dept Comp Sci & Media Technol, Gjovik, Norway
关键词
cryptography; signcryption;
D O I
10.1016/j.ipl.2006.01.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyse the Yang-Wong-Deng signcryption scheme [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference-ISC'05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218-232] proposed in ISC'05, which is the improvement and enhancement of the security of Libert-Quisquater signcryption scheme [B. Libert, J.J. Quisquater, Efficient signcryption with key privacy from gap Diffie-Hellman groups, in: Public Key Cryptography-PKC'04, in: Lecture Notes in Comput. Sci., vol. 2947, Spfinger-Verlag, Berlin, 2004, pp. 187-200]. Although Yang et al. [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference-ISC'05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218-232] proved that their scheme is secure against adaptive chosen ciphertext attacks and achieves ciphertext anonymity (which is also called key privacy) in the random oracle model; we disprove all their claims and show that their scheme is not semantically secure and does not achieve ciphertext anonymity. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:135 / 138
页数:4
相关论文
共 8 条
[1]  
BAEK J, 2002, LECT NOTES COMPUTER, V2274, P80, DOI DOI 10.1007/S00145-007-0211_0
[2]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[3]  
Libert B, 2005, LECT NOTES COMPUT SC, V3352, P220
[4]  
Libert B, 2004, LECT NOTES COMPUT SC, V2947, P187
[5]   Security analysis of signcryption scheme from q-Diffie-Hellman problems [J].
Tan, CH .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) :206-208
[6]   On the security of signcryption scheme with key privacy [J].
Tan, CH .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (04) :1093-1095
[7]  
Yang GM, 2005, LECT NOTES COMPUT SC, V3650, P218
[8]  
Zheng YL, 1997, LECT NOTES COMPUT SC, V1294, P165