Skip to main content

Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme

  • Conference paper
Book cover Information Security Applications (WISA 2008)

Abstract

In applications like wireless content distribution, a central authority needs to deliver encrypted data to a large number of recipients in such a way that only a privileged subset of users can decrypt it. In addition, to avert junk content or spam, subscribers must have source authentication with respect to their broadcasters. The limited memory and computational power of mobile devices, coupled with escalating costs of wireless bandwidth make efficiency a major concern. Broadcast signcryption, which enables the broadcaster to simultaneously encrypt and sign the content meant for a specific set of users in a single logical step, provides the most efficient solution to this dual problem of confidentiality and authentication. It is arguably most efficiently implemented in the ID-based setting because of its well known advantages. Only three IBBSC schemes exist in literature, one of which has already been shown to be flawed and its security leaks fixed. In this paper, we show that the remaining two — Mu et al.’s scheme and Li et al.’s scheme are also flawed. Specifically, we show that while Mu et al.’s scheme is insecure with respect to unforgeability, Li et al.’s scheme can be totally broken (with respect to both unforgeability and confidentiality). Following this, we propose a new IBBSC scheme and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aparna, R., Amberker, B.B.: Authenticated secure group communication using broadcast encryption key computation. In: ITNG 2008: Fifth International Conference on Information Technology - New Generations, pp. 348–353 (April 2008)

    Google Scholar 

  2. Bohio, M.J., Miri, A.: An authenticated broadcasting scheme for wireless ad hoc network. In: 2nd Annual Conference on Communication Networks and Services Research (CNSR), pp. 69–74 (2004)

    Google Scholar 

  3. Kanazawa, F., Ohkawa, N., Doi, H., Okamoto, T., Okamoto, E.: Broadcast encryption with sender authentication and its duality. In: International Conference on Convergence Information Technology 2007, pp. 793–798 (November 2007)

    Google Scholar 

  4. Li, F., Xin, X., Hu, Y.: Indentity-based broadcast signcryption. Computer Standards and Interfaces 30(1-2), 89–94 (2008)

    Article  Google Scholar 

  5. Mu, Y., Susilo, W., Lin, Y.-X., Ruan, C.: Identity-based authenticated broadcast encryption and distributed authenticated encryption. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 169–181. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Sharmila Deva Selvi, S., Sree Vivek, S., Naresh Karuturi, N., Gopalakrishnan, R., Pandu Rangan, C.: Cryptanalysis of bohio et al.’s id-based broadcast signcryption scheme for wireless ad-hoc networks. In: Proceedings of Sixth Annual Conference on Privacy, Security and Trust, PST 2008 (2008)

    Google Scholar 

  7. How Tan, C., Ming Teo, J.C., Amundsen, J.-A.: Authenticated broadcast encryption scheme. In: AINAW 2007: 21st International Conference Advanced Information Networking and Applications Workshops, vol. 1, pp. 512–518 (May 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Selvi, S.S.D., Vivek, S.S., Gopalakrishnan, R., Karuturi, N.N., Rangan, C.P. (2009). Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00306-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00305-9

  • Online ISBN: 978-3-642-00306-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics