Skip to main content

Breaking and Building of Threshold Signcryption Schemes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6151))

Abstract

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption in a single step, at a cost significantly lower than that is required by the traditional signature-then-encrypt approach. Threshold involved with signcryption is used where the sender or receiver side has a group of members. Threshold Signcryption comes into picture when a message to be sent needs the authentication of a particular number of members in an organization, whereas threshold unsigncryption is used where until a given number of members join, a particular message cannot be decrypted. In this paper we show that three of the threshold signcryption schemes reported in the literature, lack confidentiality under the stronger notion of insider security. We also propose an improved scheme and give the formal proof of security in new stronger security model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li Aihong Ping, J., Zheng, M.: A threshold subliminal channel for manet using publicly verifiable hybrid signcryption. In: ISW, pp. 218–232 (1994)

    Google Scholar 

  2. Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Boyen, X.: Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Chow, S.S.M., Yiu, S.-M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)

    Google Scholar 

  7. Desmedt, Y.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)

    Google Scholar 

  8. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures (extended abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)

    Google Scholar 

  9. Libert, B., Quisquater, J.-J.: Efficient signcryption with key privacy from gap diffie-hellman groups. In: Bao, F., Deng, R.H., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 187–200. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Li Changgen, X.P.: Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing. IEEE, Los Alamitos (2005)

    Google Scholar 

  11. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. ACM Commun. 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  12. Steinfeld, R., Zheng, Y.: A signcryption scheme based on integer factorization. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 308–322. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Yang, G., Wong, D.S., Deng, X.: Analysis and improvement of a signcryption scheme with key privacy. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 218–232. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E., Davida, G.I., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 291–312. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Zhang, Z., Mian, C., Jin, Q.: Signcryption scheme with threshold shared unsigncryption preventing malicious receivers. In: Proceedings of IEEE TENCON 2002 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Selvi, S.S.D., Vivek, S.S., Nayak, S., Rangan, C.P. (2010). Breaking and Building of Threshold Signcryption Schemes. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds) Information Security and Cryptology. Inscrypt 2009. Lecture Notes in Computer Science, vol 6151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16342-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16342-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16341-8

  • Online ISBN: 978-3-642-16342-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics