Abstract
Signcryption can realize the function of encryption and signature in a reasonable logic step, which can lower computational costs and communication overheads. In 2008, Selvi et al. proposed an identity-based threshold signcryption scheme. In this chapter, we show that the threshold signcryption scheme of Selvi et al. is vulnerable if the attacker can replaces the group public key. Then we point out that the receiver uses the senders’ public key without any verification in the unsigncrypt stage cause this attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zheng Y (1997) Digital signcryption or how to achieve cost (signature and Encryption)<< cost (signature) + cost (encryption), In: Proceedings of advances in CRYPTO’97, LNCS 1294. Springer, Berlin, pp 165–179
Bao F, Deng RH (1997) A signcryption scheme with signature directly verifiable by public key. In: PKC’98, LNCS, vol 1431. Springer, Berlin, pp 55–59
Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: ICISC’03, LNCS, vol 2971. Springer, Berlin, pp 352–269
Boyen X (2003) Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: CRYPT’03, LNCS, vol 2729. Springer, Berlin, pp 383–399
Mu Y, Varadharajan V (2000) Distributed signcryption. In: INDOCRYPT’00, LNCS, vol 1977. Springer, Berlin, pp 155–164
Yang G, Wong DS, Deng X (2005) Analysis and improvement of a signcryption scheme with key privacy. In: ISC’05, LNCS, vol 3650. Springer, Berlin, pp 218–232
SteinFeld R, Zheng Y (2000) A signcryption scheme based on integer factorization. In: ISW’00, LNCS, vol 1975. Springer, Berlin, pp 308–322
Libert B, Quisquater J (2004) Efficient signcryption with key prevacy from gap Diffie–Hellman groups. In: PKC’04, LNCS, vol 2947. Springer, Berlin, pp 187–200
Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. In: PKC’02, LNCS, vol 2274. Springer, Berlin, pp 80–98
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: CRYPTO’84, LNCS, vol 196. Springer, Berlin, pp 47–53
Boneh D, Franklin M (2001) Identity-based encryption from well pairing. In: CRYPTO’01, LNCS vol 2139. Springer, Berlin, pp 213–229
Barreto PSLM, Libert B, Mccullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: ASIACRYPT’05, LNCS vol 3788. Springer, Berlin, pp 515–532
Fagen L, Hu X, Xuyun N (2009) A new multi-receiver ID-based signcryption scheme for group communications. In: ICCCAS’2009. Springer, Berlin, pp 296–300
Yiliang H, Xiaolin G (2009) Multi-recipient signcryption for secure group communication. In: ICIEA. Springer, Berlin, pp 161–165
Jin Zhengping, Wen Qiaoyan, Hongzhen Du (2010) An improved semantically-secure identity-based signcryption scheme in the standard model. Comput Electr Eng 36(3):545–552
Huang X, Susilo W, Mu Y, Zhang E (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in t he ubiquitous world. In: 19th international conference on advanced information networking and applications, Taiwan, pp 649–654
Liu Z, Hu Y, Zhang X, Ma H (2010) Certificateless signcryption scheme in the standard model. Inf Sci 180(3):452–464
Yu Y, Yang B, Sun Y, Zhu S (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfaces 31(1):56–62
Desmedt Y (1987) Society and group oriented cryptography: a now concept. In: CRYPTO’87, LNCS vol 293. Springer, Berlin, pp 120–127
Desmedt Y, Frankel Y (1991) Shared generation of authenticators and signatures. In: CRYPTO’91, LNCS, vol 576. Springer, Berlin, pp 457–469
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Baek J, Zheng Y (2004) Identity-based threshold signature scheme from the bilinear pairings. In: International conference on information technology, Las Vegas, pp 124–128
Duan S, Cao Z, Lu R (2004) Robust ID-based threshold signcryption scheme from pairings. In: International conference on information security, Shanghai, pp 33–37
Peng C, Li X (2005) An identity-based threshold signcryption scheme with semantic security. Computational intelligence and security, LNAI, vol 3902. Springer, Berlin, pp 173–179
Libert B, Quisquater JJ (2003) Anew identity based signcryption schemes from pairings. IEEE information theory workshop, Paris, pp 155–158
Fagen L, Yong Y (2008) An efficient and provably secure ID-based threshold signcryption scheme. In: ICCCAS, pp 488–492
Selvi SSD, Vivek SS, Rangan CP (2008) Cryptanalysis of Li et al.’s identity-based threshold signcryption scheme. Embedded and Ubiquitous Computing, pp 127–132
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Yuan, W., Hu, L., Li, H., Chu, J. (2012). Analysis of Selvi et al.’s Identity-Based Threshold Signcryption Scheme. In: He, X., Hua, E., Lin, Y., Liu, X. (eds) Computer, Informatics, Cybernetics and Applications. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1839-5_95
Download citation
DOI: https://doi.org/10.1007/978-94-007-1839-5_95
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-1838-8
Online ISBN: 978-94-007-1839-5
eBook Packages: EngineeringEngineering (R0)