Your browser does not support JavaScript!

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In 2010, Fan et al. presented an anonymous multi-receiver identity-based encryption scheme where they adopt Lagrange interpolating polynomial mechanism. They showed that their scheme makes it impossible for an attacker or any other message receiver to derive the identity of a message receiver such that the privacy of every receiver can be guaranteed. They also formally showed that every receiver in the proposed scheme is anonymous to any other receiver. In this work, the authors study the security of Fan et al.'s anonymous multi-receiver identity-based encryption scheme. It is regretful that they found their scheme is insecure. Every receiver in Fan et al.'s scheme is not anonymous to any other receiver. The authors showed that simple protocol changes can fix these weaknesses and render Fan et al.'s scheme. The improved scheme is proved to satisfy the confidentiality and receiver anonymity in the random oracle.


    1. 1)
      • Baek, J., Safavi-Naini, R., Susilo, W.: `Efficient multi-receiver identity-based encryption and its application to broadcast encryption', PKC 2005, 2005, p. 380–397, (LNCS, 3386).
    2. 2)
    3. 3)
    4. 4)
      • Yuen, T., Wei, V.: `Fast and proven secure blind identity-based signcryption from pairings', CT-RSA, 2005, p. 305–322, (LNCS, 3376).
    5. 5)
      • Chabanne, H., Phan, D., Pointcheval, D.: `Public traceability in traitor tracing schemes', Proc. EUROCRYPT 2005, 2005, p. 542–558, (LNCS, 3494).
    6. 6)
      • Lee, J.W., Hwang, Y.H., Lee, P.J.: `Efficient public key broadcast encryption using identifier of receivers', Information Security Practice and Experience, 2006, p. 153–164.
    7. 7)
      • Lu, L., Hu, L.: `Pairing-based multi-recipient public key encryption', Proc. 2006 Int. Conf. on Security & Management, 2006, p. 159–165.
    8. 8)
      • Chatterjee, S., Sarkar, P.: `Multi-receiver identity-based key encapsulation with shortened ciphertext', Progress in Cryptology-INDOCRYPT 2006, 2006, p. 394–408.
    9. 9)
    10. 10)
      • Shamir, A.: `Identity-based cryptosystems and signature schemes', Proc. CRYPTO 84, 1984, p. 47–53, (LNCS, 196).
    11. 11)
      • Bethencourt, J., Chan, H., Perrig, A., Shi, E., Song, D.: `Anonymous multi-attribute encryption with range query and conditional decryption', CMU-CS-06-135, Technical, 2006.
    12. 12)
      • Boyen, X., Waters, B.: `Anonymous hierarchical identity-based encryption (without random oracles)', Proc. CRYPTO 2006, 2006, p. 290–307, (LNCS, 4117).
    13. 13)
      • Laguillaumie, F., Vergnaud, D.: `Time-selective convertible undeniable signatures', CT-RSA 2005, 2005, p. 154–171, (LNCS, 3376).
    14. 14)
      • Wei, V., Yuen, T., Zhang, F.: `Group signature where group manager members open authority are identity-based', ACISP 2005, 2005, p. 468–480, (LNCS, 3574).
    15. 15)
    16. 16)
    17. 17)

Related content

This is a required field
Please enter a valid email address