首页> 外文会议>International Workshop on Information Security Applications >Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
【24h】

Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme

机译:Mu等人的密码分析。'和Li等人。的计划和可证明的安全ID的广播签名(IBBSC)方案

获取原文

摘要

In applications like wireless content distribution, a central authority needs to deliver encrypted data to a large number of recipients in such a way that only a privileged subset of users can decrypt it. In addition, to avert junk content or spam, subscribers must have source authentication with respect to their broadcasters. The limited memory and computational power of mobile devices, coupled with escalating costs of wireless bandwidth make efficiency a major concern. Broadcast signcryption, which enables the broadcaster to simultaneously encrypt and sign the content meant for a specific set of users in a single logical step, provides the most efficient solution to this dual problem of confidentiality and authentication. It is arguably most efficiently implemented in the ID-based setting because of its well known advantages. Only three IBBSC schemes exist in literature, one of which has already been shown to be flawed and its security leaks fixed. In this paper, we show that the remaining two - Mu et al.'s scheme and Li et al.'s scheme are also flawed. Specifically, we show that while Mu et al.'s scheme is insecure with respect to unforgeability, Li et al.'s scheme can be totally broken (with respect to both unforgeability and confidentiality). Following this, we propose a new IBBSC scheme and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA).
机译:在像无线内容分发的应用中,中央机构需要将加密数据传送到大量收件人,以这样的方式,只有特权用户可以解密它。此外,为了避免垃圾内容或垃圾邮件,用户必须对其广播公司提供源认证。移动设备的存储器和计算能力有限,加上无线带宽的升级成本使得效率成为主要问题。广播签名,使广播公司能够同时加密并签署在单个逻辑步骤中为特定用户集合的内容,为该机密性和认证的这种双重问题提供最有效的解决方案。由于其众所周知的优点,它可以在基于ID的环境中最有效地实现。文学中只存在三个IBBSC方案,其中一个已经被证明存在缺陷,其安全泄漏固定。在本文中,我们展示了剩下的两个 - 穆等人。的计划和李等人。的计划也有缺陷。具体而言,我们表明,穆等人的计划是关于不可识别的不安全,Li等人可以完全破坏(关于不可折旧和机密性)。在此之后,我们提出了一种新的IBBSC计划,并在最强大的现有安全模型中正式证明其安全性用于广播签约(IND-CCA2和EUF-CMA)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号