Abstract

Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication. Wei’s proposed an ID based generalized signcryption scheme for authentication and confidentiality of big data in a standard model, claiming that their scheme holds the security of indistinguishability against adaptive chosen-ciphertext attacks and existential unforgeability against adaptive chosen message attacks. In this paper, we analyzed Wei’s scheme by launching security attacks on the scheme to check its validity. As a result, it became clear and proved that the master secret key generated in the scheme is compromisable. Similarly, the mentioned scheme does not hold the security of indistinguishability against adaptive chosen-ciphertext attacks and existential unforgeability against adaptive chosen message attacks. Consequently, Wei’s schemes is prone to attacks and is insecure.

Highlights

  • In 1984, Shamir [1] introduced the concept of Identity Based Cryptography (IBC) for the first time, where an identity is used as a public key and the corresponding private key is generated by a trusted third party entitled PKG

  • Mathematics 2019, 7, 782 like confidentiality and authentication to both authenticate and keep confidential sales related data. This type of operations require generalized signcryption (GSC) approach proposed by Han et al [15]

  • ID based generalized signcryption (IBGSC) scheme consists of three Probabilistic Polynomial Time (PPT) algorithms titled as; Setup; Ext; IBGSC and IBGUSC a Deterministic Polynomial Time (DPT) algorithm

Read more

Summary

Introduction

In 1984, Shamir [1] introduced the concept of Identity Based Cryptography (IBC) for the first time, where an identity is used as a public key and the corresponding private key is generated by a trusted third party entitled PKG. Mathematics 2019, 7, 782 like confidentiality and authentication to both authenticate and keep confidential sales related data This type of operations require generalized signcryption (GSC) approach proposed by Han et al [15]. For the requirement of a single security parameter either data confidentiality or data authentication, signcryption is not feasible due to greater computational cost and algorithmic complexities In this case, signcryption scheme is not suitable for big data and other resources constraint environment. Wei et al [22] proposed a novel IBGSC scheme for pure encryption or pure signature to ensure the confidentiality and authenticity as per requirements in big data with the claim that this scheme is provably secure in standard model.

Preliminaries
IBGSC Formal Framework
The CCA Security Model
The EUF-CMA Security Model
Review of Wei’s IBGSC Scheme
PKG Compromise Attack
Attack on Semantic Security
Attack against Existential Unforgeability
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.