Cryptanalysis of Attribute-based Ring Signcryption Scheme

Signcryption can offer authentication and confidentiality simultaneously with better efficiency than traditional signature-then-encryption approach. Ring signature enables a user to conscribe arbitrarily a group of ring members and sign a message on behalf of the ring (which includes himself) without revealing his real identity. By integrating the notion of signcryption and ring signature, ring signcryption has been initialized to leak secrets in an authenticated and confidential way anonymously. Recently, Guo et al. (Guo Z, Li M, Fan X. Attribute-based ring signcryption scheme. Security and Communication Networks, vol. 6, no. 6, pp. 790-796, 2013) proposed a ring signcryption scheme in attribute-based cryptography. Furthermore, they claimed that their scheme can satisfy confidentiality and unforgeability in the random oracle model. Unfortunately, by giving concrete attacks, we indicate that Guo et al.’s attribute-based ring signcryption scheme doesn’t provide confidentiality and unforgeability.

[1]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[2]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[3]  Qiaoyan Wen,et al.  An Improved Certificateless Signcryption in the Standard Model , 2015, Int. J. Netw. Secur..

[4]  Ron Steinfeld,et al.  A Signcryption Scheme Based on Integer Factorization , 2000, ISW.

[5]  Robert H. Deng,et al.  A secure extension of the Kwak-Moon group signcryption scheme , 2006, Comput. Secur..

[6]  Zhong Chen,et al.  Security Flaw of an ECC-based Signcryption Scheme with Anonymity , 2013, Int. J. Netw. Secur..

[7]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[8]  Yong Yu,et al.  Provably Secure Identity-Based Threshold Unsigncryption Scheme , 2007, ATC.

[9]  Mohsen Toorani,et al.  Cryptanalysis of an Elliptic Curve-based Signcryption Scheme , 2010, Int. J. Netw. Secur..

[10]  Yuliang Zheng,et al.  Practical Signcryption , 2010, Information Security and Cryptography.

[11]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[12]  Xinyi Huang,et al.  Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..

[13]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[14]  Mingwu Zhang,et al.  Notes on Proxy Signcryption and Multi-proxy Signature Schemes , 2015, Int. J. Netw. Secur..

[15]  Fahad Bin Muhaya,et al.  Lattice‐based signcryption , 2013, Concurr. Comput. Pract. Exp..

[16]  Fagen Li,et al.  A Pairing-Based Signcryption Scheme Using Self-Certified Public Keys , 2007 .

[17]  Han-Yu Lin,et al.  Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..

[18]  Mingchu Li,et al.  Attribute-based ring signcryption scheme , 2013, Secur. Commun. Networks.

[19]  Fagen Li,et al.  ID-based Signcryption Scheme with (t, n) Shared Unsigncryption , 2006, Int. J. Netw. Secur..

[20]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[21]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[22]  Wenbo Mao,et al.  Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.

[23]  Yi Mu,et al.  Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[24]  Jin Li,et al.  Attribute-Based Ring Signatures , 2008, IACR Cryptol. ePrint Arch..