In this paper, we analyse the Yang-Wong-Deng signcryption scheme [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference--ISC'05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218-232] proposed in ISC'05, which is the improvement and enhancement of the security of Libert-Quisquater signcryption scheme [B. Libert, J.J. Quisquater, Efficient signcryption with key privacy from gap Diffie-Hellman groups, in: Public Key Cryptography--PKC'04, in: Lecture Notes in Comput. Sci., vol. 2947, Springer-Verlag, Berlin, 2004, pp. 187-200]. Although Yang et al. [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference--ISC'05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218-232] proved that their scheme is secure against adaptive chosen ciphertext attacks and achieves ciphertext anonymity (which is also called key privacy) in the random oracle model; we disprove all their claims and show that their scheme is not semantically secure and does not achieve ciphertext anonymity.
[1]
Chik How Tan.
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems
,
2006,
IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2]
Jean-Jacques Quisquater,et al.
Improved Signcryption from q-Diffie-Hellman Problems
,
2004,
SCN.
[3]
Chik How Tan.
On the Security of Signcryption Scheme with Key Privacy
,
2005,
IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4]
Joonsang Baek,et al.
Formal Proofs for the Security of Signcryption
,
2002,
Journal of Cryptology.
[5]
Xavier Boyen,et al.
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography)
,
2003,
CRYPTO.
[6]
Jean-Jacques Quisquater,et al.
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
,
2004,
Public Key Cryptography.
[7]
Xiaotie Deng,et al.
Analysis and Improvement of a Signcryption Scheme with Key Privacy
,
2005,
ISC.
[8]
Yuliang Zheng,et al.
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
,
1997,
CRYPTO.