Skip to main content
Log in

Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, Sharma et al. (Wirel Pers Commun, 2015. doi:10.1007/s11277-015-2698-2) proposed a pairing-free certificateless ring signcryption scheme (PF-CLRSC) and used it for the environment of wireless sensor networks. They claimed that their scheme was provably secure. Unfortunately, we present two concrete attacks to demonstrate that their scheme can provide neither confidentiality nor unforgeability against Type I adversary. The analysis shows that Sharma et al.’s PF-CLRSC scheme is not suitable for practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature and encryption) ≪cost (signature)+ cost (encryption). Advances in CryptologyCrypto’97, LNCS 1294 (pp. 165–179). Berlin: Springer.

  2. Steindeld, R., & Zheng, Y. (2000). A signcryption scheme based on integer factorization. ISW’2000, LNCS 1975 (pp. 308–322). Berlin: Springer.

  3. Molone-Lee, J. (2002). Identity-based signcryption. Cryptology ePrint archive. Report 2002/098. http://eprint.iacr.org/2002/098.2011-6-2

  4. Libert, B., & Quisquater, J. (2003). A new identity based signcryption scheme from pairings. In The IEEE information theory workshop (ITW’2003), Paris (pp. 155–158).

  5. Chow, S., Yiu, S., Hui, L., & Chow, K. (2004). Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. Information Security and Cryptology (ICISC’2003), LNCS 2971 (pp. 252–369). Berlin: Springer.

  6. Chen, L., Malonee-Lee, J. (2005). Improved identity-based signcryption. Practice and Theory in Public Key Cryptography-PKC’2005, LNCS 3386 (pp. 362–379). Berlin: Springer.

  7. Boyen, X. (2003). Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. Advances in Cryptology-Crypto’2003, LNCS 2729 (pp. 383–399). Berlin: Springer.

  8. Al-Riyami, S. S., Paterson, K. G. (2003). Certificateless public key cryptography. In AsiaCrypt’2003, LNCS (Vol. 2894, pp. 452–473).

  9. Xie, W., & Zhang, Z. (2010). Efficient and provably secure certificateless signcryption from bilinear maps. In Wireless communications, networking and information security (WCNIS 2010) (pp. 558–562).

  10. Sharma, G., Bala, S., & Verma, A. K. (2015). Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks. Wireless Personal Communications. doi:10.1007/s11277-015-2698-2.

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank all editors and anonymous reviewers for their suggestions and comments for improvement of the paper. This work was supported in part by the National Natural Science Foundation of China (Nos. 61572379, 61501333, 61402339, U1536204), in part by the National High-Tech Research and Development Program of China (863 Program) (No. 2015AA016004), and in part by the Natural Science Foundation of Hubei Province of China (No. 2015CFB257).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, H., Chen, J., He, D. et al. Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme. Wireless Pers Commun 96, 5635–5641 (2017). https://doi.org/10.1007/s11277-017-4438-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4438-2

Keywords

Navigation