Abstract
Ring signcryption scheme is an important cryptographic primitive that can be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth.In this paper,we analyze two ring signcryption schemes:Wang-Zhang-Ma’s scheme (2007) and Zhu-Zhang-Wang’s scheme (2008). We give different attack methods to the above two ring signcryption schemes. There exist Malicious KGC attack and Non-repudiation attack on Wang-Zhang-Ma’s scheme (2007).There exist anonymity attack and existential unforgeability attack on Zhu-Zhang-Wang’s scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Huang, X.Y., Susilo, W., Mu, Y., Zhang, F.T.: Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. In: AINA 2005, pp. 649–654. IEEE Computer Society Press, Los Alamitos (2005)
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Zhang, F., Kim, K.: ID-based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)
Herranz, J., Sáez, G.: Forking lemmas for ring signature schemes. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 266–279. Springer, Heidelberg (2003)
Wang, L.L., Zhang, G.Y., Ma, C.G.: A Secure Ring Signcryption Scheme for Private and Anonymous Communication. In: 2007 IFIP International Conference on Network and Parallel Computing-Workshops, pp. 107–111. IEEE Computer Society Press, Los Alamitos (2007)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Zhu, Z.C., Zhang, Y.Q., Wand, F.J.: An Efficient Identity-based Ring Signcryption Scheme, http://eprint.iacr.org/2008/254
Au, M.H., Joseph, J.C., Liu, K., Mu, Y., Wong, D.S., Yang, G.M.: Malicious KGC Attacks in Certificateless Cryptography. In: ASIAN ACM Symposium on Information, Computer and Communications Security, pp. 302–311. ACM, New York (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Yu, H. (2009). Cryptanalysis of Two Ring Signcryption Schemes. In: Yung, M., Liu, P., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2008. Lecture Notes in Computer Science, vol 5487. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01440-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-01440-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01439-0
Online ISBN: 978-3-642-01440-6
eBook Packages: Computer ScienceComputer Science (R0)