Abstract
Signcryption is functional combination of encryption and signature, efficiency higher than the separate signing and encrypting. Recently, Youn et al. presented a new signcryption scheme, which has fast online signing and short signcryptext, and is efficient enough for mobile applications. This scheme is claimed to be both existentially unforgeable and semantically secure. However, in this paper we shall show that it is not existentially unforgeable.
Similar content being viewed by others
References
Zheng Y L. Digital signcryption or how to achieve cost(signature & encryption) 〈〈 cost(signature) + cost(encryption). In: Proceedings of 17th Annual International Cryptology Conference on Advances in Cryptology-Cryptpo, Santa Barbara, 1997. 165–179
Zheng Y L, Imai H. How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett, 1998, 68: 227–233
An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002. 83–107
Libert B, Quisquater J J. Improved signcryption from q-Diffie-Hellman problems. In: Proceedings of 4th International Conference on Security in Communication Networks (SCN 2005), Amalfi, 2005. 220–234
Libert B, Quisquater J J. Efficient signcryption with key privacy from gap diffie-hellman groups. In: Proceedings of 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004), Singapore, 2004. 187–200
Malone L J, Mao W. Two birds one stone: signcryption using RSA. In: Proceedings of the Cryptographers’ Track at the RSA Conference (CT-RSA 2003), San Francisco, 2003. 211–226
Ma C. Efficient short signcryption scheme with public verifiability. In: Proceedings of Information Security and Cryptology, Beijing, 2006. 118–129
Hu Z, Lin D, Wu W, et al. Constructing parallel long-message signcryption scheme from trapdoor permutation. Sci China Ser F-Inf Sci, 2007, 50: 82–98
Tan C H. Signcryption scheme in multi-user setting without random oracles. In: Proceedings of Advances in Information and Computer Security, 3rd International Workshop on Security (IWSEC 2008), Kagawa, 2008. 64–82
Sun Y X, Li H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci China Inf Sci, 2010, 53: 557–566
Boyen X. Multipurpose identity-based signcryption. In: Proceedings of Advances in Cryptology, 23rd Annual International Cryptology Conference (CRYPTO 2003), Santa Barbara, 2003. 383–399
Huang X, Susilo W, Mu Y, et al. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, 2005. 649–654
Barreto P S LM, Libert B, McCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Proceedings of Advances in Cryptology, 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2005), Chennai, 2005. 515–532
Li X, Qian H, Weng J, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math Comput Model, 2013, 57: 503–511
Barbosa M, Farshim P. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), Tokyo, 2008. 369–372
Li F, Shirase M, Takagi T. Certificateless hybrid signcryption. In: Proceedings of 5th International Conference on Information Security Practice and Experience (ISPEC 2009), Xi’an, 2009. 112–123
Weng J, Yao G, Deng R H, et al. Cryptanalysis of a certificateless signcryption scheme in the standard model. Inform Sciences, 2011, 181: 661–667
Youn T Y, Hong D. Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Sci China Inf Sci, 2012, 55: 2530–2541
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhou, D., Weng, J., Guan, C. et al. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Sci. China Inf. Sci. 57, 1–5 (2014). https://doi.org/10.1007/s11432-013-4983-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-013-4983-6