• When j = 1 and j − 1 = n, let j = ψ
∗
+ 1, ψ
∗
+
2, . . ., t, 1, . . . , ψ
∗
− 1, select s
∗
j
∈
R
[1, q − 1] and
compute c
∗
j
= H(m
0
||x
∗
j− 1
) and (x
∗
j
, y
∗
j
) = T
∗
j
=
s
j
P+ c
j
Q
j
.
• Compute c
ψ
∗
= H(mkx
ψ
∗
−1
) and s
ψ
∗
= k
∗
−
d
ψ
∗
c
ψ
∗
(modq).
• m
∗
= m
′
= E
x
e
(m
b
).
• sends σ
∗
= (m
∗
, c
∗
1
, s
∗
1
, s
∗
2
, . . . , s
∗
t
, R
∗
) to the
Unsigncrypt oracle with U
v
as receiver.
• Unsigncrypt oracle returns m
0
if σ is a valid sign-
cryption on m
0
. In other words, if m
∗
= m
′
is
the encryption of m
0
then the signature generated
as part of σ
∗
by A with m
0
is a valid signature
and hence σ
∗
is a valid signcryption from U
∗
to
receiver U
v
. Else, m
′
is the encryption of m
1
.
Hence, if the output of Unsigncrypt oracle is m
0
if σ
∗
is a valid signcryption of m
0
. Otherwise,
A returns ”INVALID”. Thus A can distinguish
whether σ is the signcryption of m
0
or m
1
with-
out knowing the private key of the receiver U
v
.
Thus, breaking the confidentiality of Chung et al.
scheme.
5 CONCLUSIONS
In this paper we have showed attacks on confidential-
ity and anonymity of Li et al.’s identity-based ring
signcryption scheme. Also, we have showed the at-
tack on confidentiality of Chung et al.’s anonymous
signcryption scheme.
REFERENCES
Abe, M., Ohkubo, M., and Suzuki, K. (2002). 1-out-of-
n signatures from a variety of keys. In ASIACRYPT
’02: Proceedings of the 8th International Confer-
ence on the Theory and Application of Cryptology and
Information Security, pages 415–432, London, UK.
Springer-Verlag.
Bender, A., Katz, J., and Morselli, R. (2006). Ring signa-
tures: Stronger definitions, and constructions without
random oracles. In TCC 06, volume 3876 of Lecture
Notes in Computer Science, pages 60–79. Springer.
Chung, Y.-F., Wu, Z. Y., Lai, F., and Chen, T.-S. (2006).
Anonymous signcryption in ring signature scheme
over elliptic curve cryptosystem. In JCIS 06. Atlantis
Press.
Herranz, J. and S´aez, G. (2004). New identity-based ring
signature schemes. In ICICS, volume 3269 of Lecture
Notes in Computer Science, pages 27–39. Springer.
Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005).
Identity-based ring signcryption schemes: Crypto-
graphic primitives for preserving privacy and authen-
ticity in the ubiquitous world. In AINA ’05, pages
649–654.
Li, F., Shirase, M., and Takagi, T. (2008a). Analysis
and improvement of authenticatable ring signcryption
scheme. In ProvSec ’08.
Li, F., Xiong, H., and Yu, Y. (2008b). An efficient id-
based ring signcryption scheme. In International Con-
ference on Communications, Circuits and Systems -
2008. ICCCAS 2008., pages 483–487. IEEE.
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How to
leak a secret. In ASIACRYPT ’01, pages 552–565.
Wang, L., Zhang, G., and Ma, C. (2007). A secure ring
signcryption scheme for private and anonymous com-
munication. In NPC ’07: Proceedings of the 2007
IFIP International Conference on Network and Paral-
lel Computing Workshops, pages 107–111, Washing-
ton, DC, USA. IEEE Computer Society.
Yu, Y., Li, F., Xu, C., and Sun, Y. (2008). An effi-
cient identity-based anonymous signcryption scheme.
Wuhan University Journal of Natural Sciences, Vol-
ume: 13, Number: 6, December, 2008:670–674.
Yu Fang Chung, Zhen Yu Wu, T. S. C. (2008). Ring signa-
ture scheme for ecc-based anonymous signcryption.
In Computer Standards & Interfaces Journal.
Zhang, F. and Kim, K. (2002). Id-based blind signature and
ring signature from pairings. In ASIACRYPT’02: Pro-
ceedings of the 8th International Conference on the
Theory and Application of Cryptology and Informa-
tion Security, pages 533–547, London, UK. Springer-
Verlag.
Zhang, J., Gao, S., Chen, H., and Geng, Q. (2009). A
novel id-based anonymous signcryption scheme. In
APWeb/WAIM ’09, volume 5446 of Lecture Notes in
Computer Science, pages 604–610. Springer.
Zhang, M., Yang, B., Zhu, S., and Zhang, W. (2008). Ef-
ficient secret authenticatable anonymous signcryption
scheme with identity privacy. In PAISI, PACCF and
SOCO ’08: Proceedings of the IEEE ISI 2008 PAISI,
PACCF, and SOCO international workshops on In-
telligence and Security Informatics, pages 126–137.
Springer-Verlag.
Zheng, Y. (1997). Digital signcryption or how to achieve
cost(signature & encryption) < < cost(signature) +
cost(encryption). In CRYPTO ’97, pages 165–179.
Zhun, L. and Zhang, F. (2008). Efficient idbased ring signa-
ture and ring signcryption schemes. In International
Conference on Computational Intelligence and Secu-
rity, 2008. CIS ’08., volume 2, pages 303–307.
SECRYPT 2009 - International Conference on Security and Cryptography
224