PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cryptanalysis of an Identity Based Signcryption without Random Oracles

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overhead than signing and encrypting separately. Recently, Yu et al. proposed an identity based signcryption scheme with a claimed proof of security. We show that their scheme is not secure even against a chosen-plaintext attack.
Wydawca
Rocznik
Strony
105--109
Opis fizyczny
Bibliogr. 13 poz.
Twórcy
autor
autor
autor
  • School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054, No.4,Section 2,North Jianshe Road,Chengdu,P.R.China, xionghu.uestc@gmail.com
Bibliografia
  • [1] J. Baek, R. Steinfeld, and Y. Zheng, "Formal proofs for the security of signcryption", In Proc. Public Key Cryptography-PKC 2002, LNCS 2274, pp. 80-98, Springer-Verlag, 2002.
  • [2] D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing", In Proc. Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
  • [3] C. Gamage, J. Leiwo, and Y. Zheng, "Encrypted message authentication by firewalls", In Proc. Public Key Cryptography-PKC'99, LNCS 1560, pp. 69-81, Springer-Verlag, 1999.
  • [4] L. Guillou and J.J. Quisquater, "A "Paradoxical" Identity-based signature scheme resulting from zeroknowledge", In Proc. Advances in Cryptology-CRYPTO'88, LNCS 403, pp. 216-231, Springer-Verlag, 1988.
  • [5] H.Y. Jung, D.H. Lee, J.I. Lim, and K.S. Chang, "Signcryption schemes with forward secrecy", In Proc. Information Security Application-WISA 2001, pp. 463-475, Seoul, Korea, 2001.
  • [6] J. Malone-Lee and W. Mao, "Two birds one stone: signcryption using RSA", In Proc. Topics in Cryptology-CT-RSA 2003, LNCS 2612, pp. 211-226, Springer-Verlag, 2003.
  • [7] A. Shamir, "Identity-based cryptosystems and signature schemes", In Proc. Advances in Cryptology-CRYPTO'84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
  • [8] J.B. Shin, K. Lee, and K. Shim, "New DSA-verifiable signcryption schemes", In Proc. Information Security and Cryptology-ICISC 2002, LNCS 2587, pp. 35-47, Springer-Verlag, 2003.
  • [9] B. Waters, "Efficient identity-based encryption without random oracles", In Ronald Cramer, editor, EUROCRYPT 2005, LNCS 3494, pp. 114-127. Springer, 2005.
  • [10] D.H. Yum and P.J. Lee, "New signcryption schemes based on KCDSA", In Proc. Information Security and Cryptology-ICISC 2001, LNCS 2288, pp. 305-317, Springer-Verlag, 2002.
  • [11] Y. Yu, B. Yang, Y. Sun, and S.L. Zhu, "Identity-based signcryption scheme without random oracles", Compouter Standards & Interface, Vol. 31, pp. 56-62, 2009.
  • [12] Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption)", In Proc. Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, Springer-Verlag, 1997.
  • [13] Y. Zheng and H. Imai, "How to construct efficient signcryption schemes on elliptic curves", Information Processing Letters, Vol.68, No.5, pp. 227-233, 1998.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0018-0006
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.