Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A Secure Ring Signcryption Scheme for Private and Anonymous Communication
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Hi-index | 0.00 |
Ring signcryption scheme is an important cryptographic primitive that can be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth.In this paper,we analyze two ring signcryption schemes:Wang-Zhang-Ma's scheme (2007) and Zhu-Zhang-Wang's scheme (2008). We give different attack methods to the above two ring signcryption schemes. There exist Malicious KGC attack and Non-repudiation attack on Wang-Zhang-Ma's scheme (2007).There exist anonymity attack and existential unforgeability attack on Zhu-Zhang-Wang's scheme.