Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Signcryption is functional combination of encryption and signature, efficiency higher than the separate signing and encrypting. Recently, Youn et al. presented a new signcryption scheme, which has fast online signing and short signcryptext, and is efficient enough for mobile applications. This scheme is claimed to be both existentially unforgeable and semantically secure. However, in this paper we shall show that it is not existentially unforgeable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zheng Y L. Digital signcryption or how to achieve cost(signature & encryption) 〈〈 cost(signature) + cost(encryption). In: Proceedings of 17th Annual International Cryptology Conference on Advances in Cryptology-Cryptpo, Santa Barbara, 1997. 165–179

    Google Scholar 

  2. Zheng Y L, Imai H. How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett, 1998, 68: 227–233

    Article  MathSciNet  Google Scholar 

  3. An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002. 83–107

    Google Scholar 

  4. Libert B, Quisquater J J. Improved signcryption from q-Diffie-Hellman problems. In: Proceedings of 4th International Conference on Security in Communication Networks (SCN 2005), Amalfi, 2005. 220–234

    Google Scholar 

  5. Libert B, Quisquater J J. Efficient signcryption with key privacy from gap diffie-hellman groups. In: Proceedings of 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004), Singapore, 2004. 187–200

    Chapter  Google Scholar 

  6. Malone L J, Mao W. Two birds one stone: signcryption using RSA. In: Proceedings of the Cryptographers’ Track at the RSA Conference (CT-RSA 2003), San Francisco, 2003. 211–226

    Google Scholar 

  7. Ma C. Efficient short signcryption scheme with public verifiability. In: Proceedings of Information Security and Cryptology, Beijing, 2006. 118–129

    Chapter  Google Scholar 

  8. Hu Z, Lin D, Wu W, et al. Constructing parallel long-message signcryption scheme from trapdoor permutation. Sci China Ser F-Inf Sci, 2007, 50: 82–98

    Article  MATH  MathSciNet  Google Scholar 

  9. Tan C H. Signcryption scheme in multi-user setting without random oracles. In: Proceedings of Advances in Information and Computer Security, 3rd International Workshop on Security (IWSEC 2008), Kagawa, 2008. 64–82

    Google Scholar 

  10. Sun Y X, Li H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci China Inf Sci, 2010, 53: 557–566

    Article  MathSciNet  Google Scholar 

  11. Boyen X. Multipurpose identity-based signcryption. In: Proceedings of Advances in Cryptology, 23rd Annual International Cryptology Conference (CRYPTO 2003), Santa Barbara, 2003. 383–399

    Google Scholar 

  12. Huang X, Susilo W, Mu Y, et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, 2005. 649–654

    Google Scholar 

  13. Barreto P S LM, Libert B, McCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Proceedings of Advances in Cryptology, 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2005), Chennai, 2005. 515–532

    Google Scholar 

  14. Li X, Qian H, Weng J, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math Comput Model, 2013, 57: 503–511

    Article  MathSciNet  Google Scholar 

  15. Barbosa M, Farshim P. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), Tokyo, 2008. 369–372

    Chapter  Google Scholar 

  16. Li F, Shirase M, Takagi T. Certificateless hybrid signcryption. In: Proceedings of 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Xi’an, 2009. 112–123

    Chapter  Google Scholar 

  17. Weng J, Yao G, Deng R H, et al. Cryptanalysis of a certificateless signcryption scheme in the standard model. Inform Sciences, 2011, 181: 661–667

    Article  MATH  MathSciNet  Google Scholar 

  18. Youn T Y, Hong D. Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Sci China Inf Sci, 2012, 55: 2530–2541

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Weng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, D., Weng, J., Guan, C. et al. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Sci. China Inf. Sci. 57, 1–5 (2014). https://doi.org/10.1007/s11432-013-4983-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-013-4983-6

Keywords