http://iet.metastore.ingenta.com
1887

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number of blind signcryption schemes are introduced over the years and some of them are proved to be insecure. In this Letter, the authors analysed a recently proposed blind signcryption scheme based on elliptic curves and proved it is insecure. Their analysis showed that the proposed scheme is unable to provide the claimed security attributes of message integrity, authentication, unforgeability, and signer non-repudiation. After successful cryptanalysis, they introduced a modified version of this scheme to overcome the security flaws and weakness.

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
      • 6. Zheng, Y.: ‘Digital signcryption or how to achieve cost (signature and encryption) cost (signature)+cost (encryption)’, 17th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 2017, pp. 165179.
    7. 7)
    8. 8)
      • 8. Cheng, L., Wen, Q.: ‘An improved certificate less signcryption in the standard model’, Int. J. Netw. Secur., 2015, 17, (3), pp. 229237.
    9. 9)
    10. 10)
      • 10. Chaum, D.: ‘Blind signatures for untraceable payments’, in Chaum, , D., Rivest, , R.L., Sherman, , A.T. (Eds.): ‘Advances in Cryptology: Proceedings of Crypto 82’ (Springer, Boston, MA, USA, 1983), pp. 199203.
    11. 11)
      • 11. Pointcheval, D., Stern, J.: ‘New blind signatures equivalent to factorization’. 4th ACM Conf. on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 9299.
    12. 12)
      • 12. Dhanashree, M., Agrawal, M.P.J.: ‘Implementation of blind digital signature using ECC’, Int. J. Comput. Sci. Netw., 2012, 2, (9), pp. 316319.
    13. 13)
      • 13. Awasthi, A.K., Lal, S.: ‘An efficient scheme for sensitive message transmission using blind signcryption’, 2005, arXiv preprint cs/0504095.
    14. 14)
      • 14. Chakraborty, K., Mehta, J.: ‘A stamped blind signature scheme based on elliptic curve discrete logarithm problem’, Int. J. Netw. Secur., 2012, 14, (6), pp. 316319.
    15. 15)
      • 15. Yu, H.-F., Tian, L.-Q., Wang, Z.-C.: ‘Self-certified proxy blind signcryption scheme from pairings’. Proc. 2011 IEEE Int. Conf. on Network Computing and Information Security, Guilin, China, May 2011, pp. 316320.
    16. 16)
    17. 17)
      • 17. Iqbal, W., Afzal, M., Ahmad, F.: ‘An efficient elliptic curve based signcryption scheme for firewalls’. 2nd National Conf. on Information Assurance (NCIA), Rawalpindi, Pakistan, December 2013, pp. 6772.
    18. 18)
    19. 19)
      • 19. Su, P.C., Tsai, C.H.: ‘New proxy blind signcryption scheme for secure multiple digital messages transmission based on elliptic curve cryptography’, KSII Transactions on Internet and Information Systems, 2017, 11, (11), pp. 55375555.
    20. 20)
      • 20. Tsai, C.H., Su, P.C.: ‘An ECC-based blind signcryption scheme for multiple digital documents’, Secur. Commun. Netw., 2017, 2017, pp. 114.
    21. 21)
      • 21. Ullah, R., Nizamuddin, A.I., Amin, N.: ‘Blind signcryption scheme based on elliptic curve’. IEEE Conf. on Information Assurance and Cyber Seccurity (CIACS), Rawalpindi, Pakistan, June 2014, pp. 5154.
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2019.0032
Loading

Related content

content/journals/10.1049/el.2019.0032
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address