On the Security of Two Ring Signcryption Schemes

نویسندگان

  • S. Sree Vivek
  • S. Sharmila Deva Selvi
  • C. Pandu Rangan
چکیده

Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes from one of the ring member, but does not know the actual sender. In this paper, we show attacks on ring signcryption schemes by Li et al. (Li et al., 2008b) and Chung et al. (Chung et al., 2006). We demonstrate anonymity and confidentiality attack on the scheme by Li et al. (Li et al., 2008b) and confidentiality attack on the scheme by Chung et al. (Chung et al., 2006). ∗Work supported by Project No. CSE/0506/076/DITX/CPAN on Protocols for Secure Communication and Computation sponsored by Department of Information Technology, Government of India

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of Identity Based Ring Signcryption Schemes

Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. Ring signcryption enables a user to signcrypt a message along with the identities of a set of potential senders (that includes him) without revealing which user in the set has actually produced the signcryption. Thus a ...

متن کامل

An Efficient Identity-based Ring Signcryption Scheme

ZhenChao ZHU1,2 Yuqing ZHANG2,* Fengjiao WANG2 1. (Key Lab of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi’an, 710071,P.R.China) 2. (National Computer Network Intrusion Protection Center, GUCAS, Beijing 100049,P.R.China) Abstract: ID-based ring signcryption schemes (IDRSC) are usually derived from bilinear parings, a powerful but computationally exp...

متن کامل

Improved Fair Exchange Protocol Based on Signcryption-Based Concurrent Signature

Through analysis, we point out Luo et al.’s and Sun et al.’s signcryption-based concurrent signature schemes have the same defect in ambiguity and therefore the fair exchange protocols based on their schemes are not fair. Thus based on the notions of signcryption and concurrent signature, a new signcryption-based concurrent signature scheme from bilinear pairing is presented, and based on this ...

متن کامل

Description of Provably Secure Signcryption Schemes

In this report we provide a detailed description of four signcryption schemes all of which have been proven secure. The first two of the schemes are based on discrete logarithm on finite fields and the other two schemes are based on elliptic curves. We also discuss issues on the implementation of signcryption schemes.

متن کامل

Improvements and generalisations of signcryption schemes

In this work, we study the cryptographic primitive: signcryption, which combines the functionalities of digital signatures and public-key encryption. We first propose two generic transforms from meta-ElGamal signature schemes to signcryption schemes. These constructions can be thought of as generalisations of the signcryption schemes by Zheng and Gamage et al. Our results show that a large clas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009