Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient short signcryption scheme with public verifiability
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Improved signcryption from q-Diffie-Hellman problems
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Hi-index | 0.00 |
Signcryption is an asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a low computational and communication overhead. Indistinguishability and unforgeability are two primitive properties of a secure signcryption. Recently, to satisfy the security requirements of Ad hoc networks, Li et.al proposed two Multi-PKG ID-based signcryption schemes in ANCS2007 and Inscrypt2008, respectively. To satisfy the security requirements of multi-user setting, Li et.al also proposed a multirecipient signcryption scheme. In this work, we analyze the security of three signcryption schemes and show that the two Multi-PKG ID-based signcryption schemes are insecure against chosen ciphertext attacks and the multi-recipient signcryption scheme is insecure against chosen message attacks. And we discuss the reason of producing such attacks and the corresponding revised methods for each scheme.