IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v7y2019i9p782-d260737.html
   My bibliography  Save this article

Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption

Author

Listed:
  • Abdul Waheed

    (Department of Information Technology, Hazara University, Mansehra 21120, KP, Pakistan
    Department of Computer Science, IQRA National University, Peshawar 25124, KP, Pakistan
    These authors contributed equally to this work.)

  • Arif Iqbal Umar

    (Department of Information Technology, Hazara University, Mansehra 21120, KP, Pakistan
    These authors contributed equally to this work.)

  • Nizamud Din

    (Department of Computer Science, University of Chitral, Chitral 17200, KP, Pakistan
    These authors contributed equally to this work.)

  • Noor Ul Amin

    (Department of Information Technology, Hazara University, Mansehra 21120, KP, Pakistan
    These authors contributed equally to this work.)

  • Saleem Abdullah

    (Department of Mathematics, AWKUM University, Mardan 23200, KP, Pakistan
    These authors contributed equally to this work.)

  • Poom Kumam

    (Department of Mathematics, King Mungkut’s University of Technology Thonburi, Bangkok 10140, Thailand
    These authors contributed equally to this work.)

Abstract

Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication. Wei’s proposed an ID based generalized signcryption scheme for authentication and confidentiality of big data in a standard model, claiming that their scheme holds the security of indistinguishability against adaptive chosen-ciphertext attacks and existential unforgeability against adaptive chosen message attacks. In this paper, we analyzed Wei’s scheme by launching security attacks on the scheme to check its validity. As a result, it became clear and proved that the master secret key generated in the scheme is compromisable. Similarly, the mentioned scheme does not hold the security of indistinguishability against adaptive chosen-ciphertext attacks and existential unforgeability against adaptive chosen message attacks. Consequently, Wei’s schemes is prone to attacks and is insecure.

Suggested Citation

  • Abdul Waheed & Arif Iqbal Umar & Nizamud Din & Noor Ul Amin & Saleem Abdullah & Poom Kumam, 2019. "Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption," Mathematics, MDPI, vol. 7(9), pages 1-8, August.
  • Handle: RePEc:gam:jmathe:v:7:y:2019:i:9:p:782-:d:260737
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/7/9/782/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/7/9/782/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:7:y:2019:i:9:p:782-:d:260737. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.