Attacks against two identity-based signcryption schemes

Xing Wang*, Hai Feng Qian

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

Signcryption is an important cryptography primitive that provides confidentiality and authenticity for the messages simultaneously, at lower costs than traditional sign-then-encrypt method. This paper presents the attacks against two identity-based signcryption schemes: the Zhang et al.'s assertion signcryption scheme in decentralized autonomous environments, which is not consistent in multi-PKG scenarios; and the Yu et al.'s identity-based signcryption scheme in the standard model, which cannot achieve indistinguishability against chosen plaintext attacks.

Original languageEnglish
Title of host publicationNSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing
Pages24-27
Number of pages4
DOIs
StatePublished - 2010
Event2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010 - Wuhan, Hubei, China
Duration: 24 Apr 201025 Apr 2010

Publication series

NameNSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing
Volume1

Conference

Conference2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010
Country/TerritoryChina
CityWuhan, Hubei
Period24/04/1025/04/10

Keywords

  • Chosen plaintext attacks
  • Consistency
  • Identity based signcryption

Fingerprint

Dive into the research topics of 'Attacks against two identity-based signcryption schemes'. Together they form a unique fingerprint.

Cite this