Abstract
Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. Ring signcryption enables a user to signcrypt a message along with the identities of a set of potential senders (that includes him) without revealing which user in the set has actually produced the signcryption. Thus a ring signcrypted message has anonymity in addition to authentication and confidentiality. Ring signcryption schemes have no group managers, no setup procedures, no revocation procedures and no coordination: any user can choose any set of users (ring), that includes himself and signcrypt any message by using his private and public key as well as other users (in the ring) public keys, without getting any approval or assistance from them. Ring Signcryption is useful for leaking trustworthy secrets in an anonymous, authenticated and confidential way.
To the best of our knowledge, seven identity based ring signcryption schemes are reported in the literature. Two of them were already proved to be insecure in [1] and [2]. In this paper, we show that four among the remaining five schemes do not provide confidentiality, to be specific, two schemes are not secure against chosen plaintext attack and other two schemes do not provide adaptive chosen ciphertext security. We then propose a new scheme and formally prove the security of the new scheme in the random oracle model. A comparison of our scheme with the only existing correct scheme by Huang et al. shows that our scheme is much more efficient than the scheme by Huang et al.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhang, M., Yang, B., Zhu, S., Zhang, W.: Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 126–137. Springer, Heidelberg (2008)
Sree Vivek, S., Sharmila Deva Selvi, S., Rangan, P.: On the security of two ring signcryption schemes. Cryptology ePrint Archive, Report 2009/052. To appear in the proceedings of SECRYPT 2009 (2009)
Huang, X., Susilo, W., Mu, Y., Zhang, F.: Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: AINA 2005: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 649–654. IEEE Computer Society, Los Alamitos (2005)
Yu, Y., Li, F., Xu, C., Sun, Y.: An efficient identity-based anonymous signcryption scheme. Wuhan University Journal of Natural Sciences 13(6), 670–674 (2008)
Zhu, Z., Zhang, Y., Wang, F.: An efficient and provable secure identity based ring signcryption scheme. Computer Standards & Interfaces, 649–654 (2008), http://dx.doi.org/10.1016/j.csi.2008.09.023
Li, F., Xiong, H., Yu, Y.: An efficient id-based ring signcryption scheme. In: International Conference on Communications, Circuits and Systems, ICCCAS 2008, May 2008, pp. 483–487 (2008)
Li, F., Shirase, M., Takagi, T.: Analysis and improvement of authenticatable ring signcryption scheme. In: International Conference ProvSec 2008, Paper appears in Journal of Shanghai Jiaotong University (Science), December 2008, vol. 13-6, pp. 679–683 (2008)
Zhun, L., Zhang, F.: Efficient identity based ring signature and ring signcryption schemes. In: International Conference on Computational Intelligence and Security, CIS 2008, December 2008, vol. 2, pp. 303–307 (2008)
Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)
Chung, Y.F., Wu, Z.Y., Chen, T.S.: Ring signature scheme for ecc-based anonymous signcryption. Computer Standards & Interfaces Journal (2008)
Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient identity based ring signature. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 499–512. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sharmila Deva Selvi, S., Sree Vivek, S., Pandu Rangan, C. (2009). On the Security of Identity Based Ring Signcryption Schemes. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds) Information Security. ISC 2009. Lecture Notes in Computer Science, vol 5735. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04474-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-04474-8_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04473-1
Online ISBN: 978-3-642-04474-8
eBook Packages: Computer ScienceComputer Science (R0)