ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES

S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan

Abstract

Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes from one of the ring member, but does not know the actual sender. In this paper, we show attacks on ring signcryption schemes by Li et al. (Li et al., 2008b) and Chung et al. (Chung et al., 2006). We demonstrate anonymity and confidentiality attack on the scheme by Li et al. (Li et al., 2008b) and confidentiality attack on the scheme by Chung et al. (Chung et al., 2006).

References

  1. Abe, M., Ohkubo, M., and Suzuki, K. (2002). 1-out-ofn signatures from a variety of keys. In ASIACRYPT 7802: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, pages 415-432, London, UK. Springer-Verlag.
  2. Bender, A., Katz, J., and Morselli, R. (2006). Ring signatures: Stronger definitions, and constructions without random oracles. In TCC 06, volume 3876 of Lecture Notes in Computer Science, pages 60-79. Springer.
  3. Chung, Y.-F., Wu, Z. Y., Lai, F., and Chen, T.-S. (2006). Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem. In JCIS 06. Atlantis Press.
  4. Herranz, J. and Sáez, G. (2004). New identity-based ring signature schemes. In ICICS, volume 3269 of Lecture Notes in Computer Science, pages 27-39. Springer.
  5. Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In AINA 7805, pages 649-654.
  6. Li, F., Shirase, M., and Takagi, T. (2008a). Analysis and improvement of authenticatable ring signcryption scheme. In ProvSec 7808.
  7. Li, F., Xiong, H., and Yu, Y. (2008b). An efficient idbased ring signcryption scheme. In International Conference on Communications, Circuits and Systems - 2008. ICCCAS 2008., pages 483-487. IEEE.
  8. Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How to leak a secret. In ASIACRYPT 7801, pages 552-565.
  9. Wang, L., Zhang, G., and Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In NPC 7807: Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops, pages 107-111, Washington, DC, USA. IEEE Computer Society.
  10. Yu, Y., Li, F., Xu, C., and Sun, Y. (2008). An efficient identity-based anonymous signcryption scheme. Wuhan University Journal of Natural Sciences, Volume: 13, Number: 6, December, 2008:670-674.
  11. Yu Fang Chung, Zhen Yu Wu, T. S. C. (2008). Ring signature scheme for ecc-based anonymous signcryption. In Computer Standards & Interfaces Journal.
  12. Zhang, F. and Kim, K. (2002). Id-based blind signature and ring signature from pairings. In ASIACRYPT 7802: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, pages 533-547, London, UK. SpringerVerlag.
  13. Zhang, J., Gao, S., Chen, H., and Geng, Q. (2009). A novel id-based anonymous signcryption scheme. In APWeb/WAIM 7809, volume 5446 of Lecture Notes in Computer Science, pages 604-610. Springer.
  14. Zhang, M., Yang, B., Zhu, S., and Zhang, W. (2008). Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In PAISI, PACCF and SOCO 7808: Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, pages 126-137. Springer-Verlag.
  15. Zheng, Y. (1997). Digital signcryption or how to achieve cost(signature & encryption) < < cost(signature) + cost(encryption). In CRYPTO 7897, pages 165-179.
  16. Zhun, L. and Zhang, F. (2008). Efficient idbased ring signature and ring signcryption schemes. In International Conference on Computational Intelligence and Security, 2008. CIS 7808., volume 2, pages 303-307.
Download


Paper Citation


in Harvard Style

Sree Vivek S., Deva Selvi S. and Rangan C. (2009). ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 219-224. DOI: 10.5220/0002205702190224


in Bibtex Style

@conference{secrypt09,
author={S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan},
title={ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={219-224},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002205702190224},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
SN - 978-989-674-005-4
AU - Sree Vivek S.
AU - Deva Selvi S.
AU - Rangan C.
PY - 2009
SP - 219
EP - 224
DO - 10.5220/0002205702190224