Header menu link for other important links
X
Cryptanalysis of Bohio et al.'s ID-based broadcast signcryption (IBBSC) scheme for wireless ad-hoc networks
S. Sharmila Deva Selvi, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
Published in
2008
Pages: 109 - 120
Abstract
Broadcast signcryption enables the broadcaster to simultaneously encrypt and sign the content meant for a specific set of users in a single logical step. It provides a very efficient solution to the dual problem of achieving confidentiality and authentication during content distribution. Among other alternatives, ID-based schemes are arguably the best suited for its implementation in wireless ad-hoc networks because of the unique advantage that they provide - any unique, publicly available parameter of a user can be his public key, which eliminates the need for a complex public key infrastructure. In 2004, Bohio et al. [4] proposed an ID-based broadcast signcryption (IBBSC) scheme which achieves constant ciphertext size. They claim that their scheme provides both message authentication and confidentiality, but do not give formal proofs. In this paper, we demonstrate how a legitimate user of the scheme can forge a valid signcrypted ciphertext, as if generated by the broadcaster. Moreover, we show that their scheme is not INDCCA secure. Following this, we propose a fix for Bohio et al.'s scheme, and formally prove its security under the strongest existing security models for broadcast signcryption (IND-CCA2 and EUF-CMA). While fixing the scheme, we also improve its efficiency by reducing the ciphertext size to two elements compared to three in [4]. © 2008 IEEE.
About the journal
JournalProceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008
Open AccessYes
Concepts (20)
  •  related image
    CIPHERTEXT
  •  related image
    Content distribution
  •  related image
    DUAL PROBLEM
  •  related image
    FORMAL PROOFS
  •  related image
    ID-BASED
  •  related image
    ID-BASED SCHEME
  •  related image
    IND-CCA
  •  related image
    LEGITIMATE USERS
  •  related image
    MESSAGE AUTHENTICATION
  •  related image
    PUBLIC KEY INFRASTRUCTURE
  •  related image
    PUBLIC KEYS
  •  related image
    SECURITY MODEL
  •  related image
    Signcryption
  •  related image
    Authentication
  •  related image
    PUBLIC KEY CRYPTOGRAPHY
  •  related image
    Security of data
  •  related image
    Telecommunication networks
  •  related image
    Wireless ad hoc networks
  •  related image
    Wireless telecommunication systems
  •  related image
    Ad hoc networks