Abstract
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks. Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme. The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme. We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.
Similar content being viewed by others
References
Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption)[C]// Proc Advances in Cryptology-CRYPTO’97, LNCS 1294, 1997: 165–179.
Shamir A. Identity-based cryptosystems and signature schemes [C]// Proc. Advances in Cryptology-CRYPTO’84, LNCS 196, 1984: 47–53.
Boneh D, Franklin M. Identity-based encryption from the weil pairing [C]// Proc Advances in Cryptology-CRYPTO 2001, LNCS 2139, 2001: 213–229.
Rivest R L, Shamir A, Tauman Y. How to leak a secret [C]// Proc Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, Berlin: Springer-Verlag, 2001: 552–565.
Zhang F, Kim K. ID-based blind signature and ring signature from pairings [C]// Proc Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer-Verlag, 2002: 533–547.
Huang X, Susilo W, Mu Y, Zhang F. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world [C]// Proc Advanced Information Networking and Applications-AINA 2005, New York: IEEE Computer Society Press, 2005: 649–654.
Zhang M, Yang B, Zhu S, et al. Efficient secret authenticatable anonymous signcryption scheme with identity privacy [C]//Proc Intelligence and Security Informatics-ISI 2008, LNCS 5075. Berlin: Springer-Verlag, 2008: 126–137.
An J H, Dodis Y, Rabin T. On the security of joint signature and encryption [C]// Proc Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, Berlin: Springer-Verlag, 2002: 83–107.
Li F, Shirase M, Takagi T. Analysis and improvement of authenticatable ring signcryption scheme [EB/OL]. http://eprint.iacr.org/2008/373.pdf, 2008.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National Natural Science Foundation of China (No. 60673075); the National High Technology Research and Development Program (863) of China (No. 2006AA01Z428); the State Key Laboratory of Information Security, and the Youth Science and Technology Foundation of UESTC
Rights and permissions
About this article
Cite this article
Li, Fg., Masaaki, S. & Tsuyoshi, T. Analysis and improvement of authenticatable ring signcryption scheme. J. Shanghai Jiaotong Univ. (Sci.) 13, 679–683 (2008). https://doi.org/10.1007/s12204-008-0679-2
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-008-0679-2