Cryptology ePrint Archive: Report 2017/222

A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption

Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin

Abstract: ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infrastructure. It has application in emerging paradigm big data security. Recently,Wei et al proposed a new ID based generalized signcryption scheme to obtain con…dentiality or/and authenticity in big data, and claimed that their scheme is provably secure in standard model. Unfortunately, by giving substantial attack, we indicate that Wei et al scheme suffer from compromise of Private Key Generator (PKG) master secret key and thus not hold the security of indistinguishability against adaptive chosen-ciphertext attacks (IND CCA) and existential unforgeability against adaptive chosen-message attacks(EUF 􀀀 CMA).

Category / Keywords: public-key cryptography /

Date: received 3 Mar 2017, withdrawn 21 Aug 2019

Contact author: sahibzadanizam at yahoo com

Available format(s): (-- withdrawn --)

Version: 20190821:161505 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]