• DocumentCode
    579933
  • Title

    Cryptanalysis of Two Identity-Based Signcryption Schemes and an Identity-Based Multi-signcryption Scheme

  • Author

    Hu, Liang ; Yuan, Wei ; Meng, Fan-er ; Li, Hong-tu ; Chu, Jian-feng

  • Author_Institution
    Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
  • fYear
    2012
  • fDate
    3-5 Nov. 2012
  • Firstpage
    704
  • Lastpage
    708
  • Abstract
    In 2006, LI Fagen et al. proposed an efficient identity based signcryption scheme and declared that this scheme had the attributes of privacy, unforgeability, public verifiability, repudiation and forward security. After detailed analysis, we find that scheme does not meet the attributes which the author´s declared. Actually, an active attacker with the capacity of controlling the communication channel can replace the public key of the sender to forge a cipher text which can pass the unsigncrypt phase but don´t need to steal the private key of the sender. In 2009, LI Xiao et al. also found a method to forge a cipher text on the scheme of LI Fagan et al. Further, they proposed an improved identity-based signcryption scheme and declared their improved scheme had the attributes mentioned above. However we find a forged cipher text still can be constructed using the public key replacement attack. Finally, we point out the flaws in their schemes which our attack based on. In additional, we show that the Identity-Based Multi-Signcryption Scheme proposed by MENG Tao et al. in 2007 is insecure against the key replacement attack as well. In their scheme, an active attacker can replace the signcrypter´s public key and forge a valid cipher text to pass the examination of the receiver without knowledge of the signcrypter´s private key. we point out the flaws which lead to our attack succeeding to forge the valid cipher text and public key and illustrate protecting the signcrypter´s public key in the signcryption phase is very important as the message to be signcryption.
  • Keywords
    data privacy; public key cryptography; cipher text; communication channel control; cryptanalysis; forward security; identity-based multisigncryption scheme; identity-based signcryption schemes; privacy; public key replacement attack; public verifiability; repudiation; unforgeability; Encryption; Equations; Public key; Receivers; identity-based; public key replacement; signcryption multi-signcryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
  • Conference_Location
    Mathura
  • Print_ISBN
    978-1-4673-2981-1
  • Type

    conf

  • DOI
    10.1109/CICN.2012.77
  • Filename
    6375204