Skip to main content

Analysis of Selvi et al.’s Identity-Based Threshold Signcryption Scheme

  • Conference paper
  • First Online:
Computer, Informatics, Cybernetics and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 107))

  • 764 Accesses

Abstract

Signcryption can realize the function of encryption and signature in a reasonable logic step, which can lower computational costs and communication overheads. In 2008, Selvi et al. proposed an identity-based threshold signcryption scheme. In this chapter, we show that the threshold signcryption scheme of Selvi et al. is vulnerable if the attacker can replaces the group public key. Then we point out that the receiver uses the senders’ public key without any verification in the unsigncrypt stage cause this attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 549.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng Y (1997) Digital signcryption or how to achieve cost (signature and Encryption)<< cost (signature) + cost (encryption), In: Proceedings of advances in CRYPTO’97, LNCS 1294. Springer, Berlin, pp 165–179

    Google Scholar 

  2. Bao F, Deng RH (1997) A signcryption scheme with signature directly verifiable by public key. In: PKC’98, LNCS, vol 1431. Springer, Berlin, pp 55–59

    Google Scholar 

  3. Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: ICISC’03, LNCS, vol 2971. Springer, Berlin, pp 352–269

    Google Scholar 

  4. Boyen X (2003) Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: CRYPT’03, LNCS, vol 2729. Springer, Berlin, pp 383–399

    Google Scholar 

  5. Mu Y, Varadharajan V (2000) Distributed signcryption. In: INDOCRYPT’00, LNCS, vol 1977. Springer, Berlin, pp 155–164

    Google Scholar 

  6. Yang G, Wong DS, Deng X (2005) Analysis and improvement of a signcryption scheme with key privacy. In: ISC’05, LNCS, vol 3650. Springer, Berlin, pp 218–232

    Google Scholar 

  7. SteinFeld R, Zheng Y (2000) A signcryption scheme based on integer factorization. In: ISW’00, LNCS, vol 1975. Springer, Berlin, pp 308–322

    Google Scholar 

  8. Libert B, Quisquater J (2004) Efficient signcryption with key prevacy from gap Diffie–Hellman groups. In: PKC’04, LNCS, vol 2947. Springer, Berlin, pp 187–200

    Google Scholar 

  9. Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. In: PKC’02, LNCS, vol 2274. Springer, Berlin, pp 80–98

    Google Scholar 

  10. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: CRYPTO’84, LNCS, vol 196. Springer, Berlin, pp 47–53

    Google Scholar 

  11. Boneh D, Franklin M (2001) Identity-based encryption from well pairing. In: CRYPTO’01, LNCS vol 2139. Springer, Berlin, pp 213–229

    Google Scholar 

  12. Barreto PSLM, Libert B, Mccullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: ASIACRYPT’05, LNCS vol 3788. Springer, Berlin, pp 515–532

    Google Scholar 

  13. Fagen L, Hu X, Xuyun N (2009) A new multi-receiver ID-based signcryption scheme for group communications. In: ICCCAS’2009. Springer, Berlin, pp 296–300

    Google Scholar 

  14. Yiliang H, Xiaolin G (2009) Multi-recipient signcryption for secure group communication. In: ICIEA. Springer, Berlin, pp 161–165

    Google Scholar 

  15. Jin Zhengping, Wen Qiaoyan, Hongzhen Du (2010) An improved semantically-secure identity-based signcryption scheme in the standard model. Comput Electr Eng 36(3):545–552

    Article  MATH  Google Scholar 

  16. Huang X, Susilo W, Mu Y, Zhang E (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in t he ubiquitous world. In: 19th international conference on advanced information networking and applications, Taiwan, pp 649–654

    Google Scholar 

  17. Liu Z, Hu Y, Zhang X, Ma H (2010) Certificateless signcryption scheme in the standard model. Inf Sci 180(3):452–464

    Article  MATH  MathSciNet  Google Scholar 

  18. Yu Y, Yang B, Sun Y, Zhu S (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfaces 31(1):56–62

    Article  Google Scholar 

  19. Desmedt Y (1987) Society and group oriented cryptography: a now concept. In: CRYPTO’87, LNCS vol 293. Springer, Berlin, pp 120–127

    Google Scholar 

  20. Desmedt Y, Frankel Y (1991) Shared generation of authenticators and signatures. In: CRYPTO’91, LNCS, vol 576. Springer, Berlin, pp 457–469

    Google Scholar 

  21. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MATH  MathSciNet  Google Scholar 

  22. Baek J, Zheng Y (2004) Identity-based threshold signature scheme from the bilinear pairings. In: International conference on information technology, Las Vegas, pp 124–128

    Google Scholar 

  23. Duan S, Cao Z, Lu R (2004) Robust ID-based threshold signcryption scheme from pairings. In: International conference on information security, Shanghai, pp 33–37

    Google Scholar 

  24. Peng C, Li X (2005) An identity-based threshold signcryption scheme with semantic security. Computational intelligence and security, LNAI, vol 3902. Springer, Berlin, pp 173–179

    Google Scholar 

  25. Libert B, Quisquater JJ (2003) Anew identity based signcryption schemes from pairings. IEEE information theory workshop, Paris, pp 155–158

    Google Scholar 

  26. Fagen L, Yong Y (2008) An efficient and provably secure ID-based threshold signcryption scheme. In: ICCCAS, pp 488–492

    Google Scholar 

  27. Selvi SSD, Vivek SS, Rangan CP (2008) Cryptanalysis of Li et al.’s identity-based threshold signcryption scheme. Embedded and Ubiquitous Computing, pp 127–132

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Chu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Yuan, W., Hu, L., Li, H., Chu, J. (2012). Analysis of Selvi et al.’s Identity-Based Threshold Signcryption Scheme. In: He, X., Hua, E., Lin, Y., Liu, X. (eds) Computer, Informatics, Cybernetics and Applications. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1839-5_95

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-1839-5_95

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-1838-8

  • Online ISBN: 978-94-007-1839-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics