Skip to main content
Log in

Analysis and improvement of authenticatable ring signcryption scheme

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks. Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme. The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme. We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption)[C]// Proc Advances in Cryptology-CRYPTO’97, LNCS 1294, 1997: 165–179.

  2. Shamir A. Identity-based cryptosystems and signature schemes [C]// Proc. Advances in Cryptology-CRYPTO’84, LNCS 196, 1984: 47–53.

  3. Boneh D, Franklin M. Identity-based encryption from the weil pairing [C]// Proc Advances in Cryptology-CRYPTO 2001, LNCS 2139, 2001: 213–229.

  4. Rivest R L, Shamir A, Tauman Y. How to leak a secret [C]// Proc Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, Berlin: Springer-Verlag, 2001: 552–565.

    Chapter  Google Scholar 

  5. Zhang F, Kim K. ID-based blind signature and ring signature from pairings [C]// Proc Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer-Verlag, 2002: 533–547.

    Chapter  Google Scholar 

  6. Huang X, Susilo W, Mu Y, Zhang F. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world [C]// Proc Advanced Information Networking and Applications-AINA 2005, New York: IEEE Computer Society Press, 2005: 649–654.

    Google Scholar 

  7. Zhang M, Yang B, Zhu S, et al. Efficient secret authenticatable anonymous signcryption scheme with identity privacy [C]//Proc Intelligence and Security Informatics-ISI 2008, LNCS 5075. Berlin: Springer-Verlag, 2008: 126–137.

    Chapter  Google Scholar 

  8. An J H, Dodis Y, Rabin T. On the security of joint signature and encryption [C]// Proc Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, Berlin: Springer-Verlag, 2002: 83–107.

    Chapter  Google Scholar 

  9. Li F, Shirase M, Takagi T. Analysis and improvement of authenticatable ring signcryption scheme [EB/OL]. http://eprint.iacr.org/2008/373.pdf, 2008.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fa-gen Li  (李发根).

Additional information

Foundation item: the National Natural Science Foundation of China (No. 60673075); the National High Technology Research and Development Program (863) of China (No. 2006AA01Z428); the State Key Laboratory of Information Security, and the Youth Science and Technology Foundation of UESTC

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Fg., Masaaki, S. & Tsuyoshi, T. Analysis and improvement of authenticatable ring signcryption scheme. J. Shanghai Jiaotong Univ. (Sci.) 13, 679–683 (2008). https://doi.org/10.1007/s12204-008-0679-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0679-2

Key words

Navigation