DocumentCode :
1733330
Title :
Cryptanalysis of two identity-based signcryption schemes
Author :
Wang, Huaqun ; Zhang, Yuqing
Author_Institution :
Nat. Comput. Network Intrusion Protection Center, GUCAS, Beijing, China
Volume :
2
fYear :
2011
Firstpage :
694
Lastpage :
698
Abstract :
Encryption and signature schemes are fundamental cryptographic tools for providing privacy and authenticity. In the last few years, a new separate primitive - called signcryption - has emerged to model a process simultaneously achieving privacy and authenticity. In this paper, we analyze two signcryption schemes: Yu-Yang-Sun-Zhu´s scheme (2007) and Li-Xin-Hu´s scheme (2008). To Yu-Yang-Sun-Zhu´s scheme (2007), we give two attack methods that correspond to the semantic security and existential unforgeability. To Li-Xin-Hu´s scheme (2008), we show that the scheme can be broken by the attacker. Besides the receivers, the attacker can also decrypt any ciphertexts. The receiver can find the targeted master secret key.
Keywords :
cryptography; digital signatures; Li-Xin-Hu scheme; Yu-Yang-Sun-Zhu scheme; attack methods; ciphertexts; cryptanalysis; encryption; existential unforgeability; identity-based signcryption schemes; semantic security; signature schemes; targeted master secret key; Authentication; Encryption; Games; Polynomials; Receivers; crypt-analysis; identity-based cryptography; signcryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Network Technology (ICCSNT), 2011 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4577-1586-0
Type :
conf
DOI :
10.1109/ICCSNT.2011.6182061
Filename :
6182061
Link To Document :
بازگشت