Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Multi-recipient Public-Key Encryption with Shortened Ciphertext
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Versatile padding schemes for joint signature and encryption
Proceedings of the 11th ACM conference on Computer and communications security
On the Security of Signcryption Scheme with Key Privacy
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Analysis of improved signcryption scheme with key privacy
Information Processing Letters
Public-key encryption in a multi-user setting: security proofs and improvements
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient and provably secure multi-receiver identity-based signcryption
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Multi-receiver identity-based signcryption scheme in the standard model
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Hi-index | 0.00 |
Recently, Duan and Cao proposed an multi-receiver identity-based signcryption scheme. They showed that their scheme is secure against adaptive chosen ciphertext attacks in the random oracle model. In this paper, we show that their scheme is in fact not secure against adaptive chosen ciphertext attacks under their defined security model.