On the Security of Signcryption Scheme with Key Privacy
نویسنده
چکیده
The concept of a signcryption scheme is proposed by Zheng in 1997 [5]. Since then, there are many signcryption schemes proposed. It is only recently that a formal security proof model [1] is formalized providing security proof for Zheng’s scheme [5] in the random oracle model. In 2003, Boyen [3] proposed a secured identity-based signcryption scheme with ciphertext anonymity and provable secure in the random oracle model. Their security proof model is slightly different from that of [1] which includes the ciphertext anonymity. In 2004, Libert and Quisquater [4] modified Boyen’s security proof model to non-identity based signcryption scheme and proposed a signcryption scheme. They proved that their signcryption scheme is secure in the random oracle model with the following properties: semantically security against adaptive chosen ciphertext attacks, ciphertext anonymity and key invisibility. In this paper, we show that none of the above properties are achieved under their defined attacks games.
منابع مشابه
Analysis of improved signcryption scheme with key privacy
In this paper, we analyse the Yang–Wong–Deng signcryption scheme [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference—ISC’05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218–232] proposed in ISC’05, which is the improvement and enhancement of the security of Libert–Quisquater si...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملRelations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and ke...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSigncryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive nonrepudiation. This is non-repudiation in which the judge settling a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 88-A شماره
صفحات -
تاریخ انتشار 2005