On the Security of an Anonymous Multi-Receiver Encryption Protocol

Article Preview

Abstract:

Anonymous multi-receiver encryption (AME) achieves the security properties of confidentiality and anonymity. Thus, it can be used in VoIP (Voice over Internet Protocol), pay-TV systems, et al. In 2012, Zhang et al. proposed an efficient anonymous multi-receiver encryption protocol. They claimed that their protocol can protect the receiver identity privacy and keep message confidential. In this paper, we point out the weaknesses of Zhang et al.'s protocol. Their protocol cannot satisfy the anonymity against the inner attackers. On the other hand, their AME protocol cannot satisfy the indistinguishability of encryptions under selective multi-identity, chosen ciphertext attacks (IND-AME-CCA). Thus, Zhang et al.'s protocol is insecure. The analysis is important for the engineer to mitigate the security risks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 971-973)

Pages:

1667-1672

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] C. I. Fan, L. Y. Huang, and P. H. Ho, ``Anonymous multireceiver identitybased encryption, " IEEE Trans. Comput., vol. 59, no. 9, pp.1239-1249, (2010).

DOI: 10.1109/tc.2010.23

Google Scholar

[2] H. Y. Chien, ``Improved anonymous multi-receiver identity-based encryption, " Comput. J., vol. 55, no. 4, pp.439-446, (2012).

DOI: 10.1093/comjnl/bxr086

Google Scholar

[3] H. Q. Wang, Y. Q. Zhang, H. Xiong, and B. Qin, ``Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme, " IET Inf. Secur., vol. 6, no. 1, pp.20-27, (2012).

DOI: 10.1049/iet-ifs.2010.0252

Google Scholar

[4] M. W. Zhang, and T. Takagi, ``Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation, " IEEE Systems Journal, preprint, doi: 10. 1109/JSYST. 2012. 2221893.

DOI: 10.1109/jsyst.2012.2221893

Google Scholar