EconPapers    
Economics at your fingertips  
 

Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption

Abdul Waheed, Arif Iqbal Umar, Nizamud Din, Noor Ul Amin, Saleem Abdullah and Poom Kumam
Additional contact information
Abdul Waheed: Department of Information Technology, Hazara University, Mansehra 21120, KP, Pakistan
Arif Iqbal Umar: Department of Information Technology, Hazara University, Mansehra 21120, KP, Pakistan
Nizamud Din: Department of Computer Science, University of Chitral, Chitral 17200, KP, Pakistan
Noor Ul Amin: Department of Information Technology, Hazara University, Mansehra 21120, KP, Pakistan
Saleem Abdullah: Department of Mathematics, AWKUM University, Mardan 23200, KP, Pakistan
Poom Kumam: Department of Mathematics, King Mungkut’s University of Technology Thonburi, Bangkok 10140, Thailand

Mathematics, 2019, vol. 7, issue 9, 1-8

Abstract: Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication. Wei’s proposed an ID based generalized signcryption scheme for authentication and confidentiality of big data in a standard model, claiming that their scheme holds the security of indistinguishability against adaptive chosen-ciphertext attacks and existential unforgeability against adaptive chosen message attacks. In this paper, we analyzed Wei’s scheme by launching security attacks on the scheme to check its validity. As a result, it became clear and proved that the master secret key generated in the scheme is compromisable. Similarly, the mentioned scheme does not hold the security of indistinguishability against adaptive chosen-ciphertext attacks and existential unforgeability against adaptive chosen message attacks. Consequently, Wei’s schemes is prone to attacks and is insecure.

Keywords: cryptanalysis; encryption; digital signature; malicious-but-passive; Key Generation Center (KGC); ID based generalized signcryption; security model; standard model (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2019
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/7/9/782/pdf (application/pdf)
https://www.mdpi.com/2227-7390/7/9/782/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:7:y:2019:i:9:p:782-:d:260737

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:7:y:2019:i:9:p:782-:d:260737