On the security of a certificateless signcryption scheme
Title | On the security of a certificateless signcryption scheme |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Yueying Huang, Jingang Zhang, Houyan Chen |
Conference Name | Electronics, Computer and Applications, 2014 IEEE Workshop on |
Date Published | May |
Keywords | certificateless signcryption scheme, Computers, concrete attack approach, cryptographic primitive, cryptography, Diffie-Hellman problem, digital signature, digital signatures, Digital Signcryption, discrete logarithm problem, Encryption, Games, group theory, IND-CCA2 security, key replacement attack, Public key, public key cryptography, public key encryption, Receivers, security analysis |
Abstract | Signcryption is a cryptographic primitive that simultaneously realizes both the functions of public key encryption and digital signature in a logically single step, and with a cost significantly lower than that required by the traditional "signature and encryption" approach. Recently, an efficient certificateless signcryption scheme without using bilinear pairings was proposed by Zhu et al., which is claimed secure based on the assumptions that the compute Diffie-Hellman problem and the discrete logarithm problem are difficult. Although some security arguments were provided to show the scheme is secure, in this paper, we find that the signcryption construction due to Zhu et al. is not as secure as claimed. Specifically, we describe an adversary that can break the IND-CCA2 security of the scheme without any Unsigncryption query. Moreover, we demonstrate that the scheme is insecure against key replacement attack by describing a concrete attack approach. |
URL | https://ieeexplore.ieee.org/document/6845707 |
DOI | 10.1109/IWECA.2014.6845707 |
Citation Key | 6845707 |
- encryption
- Security analysis
- Receivers
- public key encryption
- public key cryptography
- Public key
- key replacement attack
- IND-CCA2 security
- group theory
- Games
- certificateless signcryption scheme
- discrete logarithm problem
- Digital Signcryption
- digital signatures
- digital signature
- Diffie-Hellman problem
- Cryptography
- cryptographic primitive
- concrete attack approach
- Computers