Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme

23Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Fan et al. proposed an anonymous multi-receiver identity-based encryption scheme in 2010, and showed that the identity of any legal receiver can be kept anonymous to anyone else. In 2012, Wang et al. pointed out that Fan et al.'s scheme cannot achieve the anonymity and that every legal receiver can determine whether the other is one of the legal receivers. At the same time, they proposed an improved scheme based on Fan et al.'s scheme to solve this anonymity problem. Unfortunately, the authors find that Wang et al.'s improved scheme still suffers from the same anonymity problem. Any legal receiver of Wang et al.'s improved scheme can judge whether anyone else is a legal receiver or not. In this study, the authors shall give the detailed anonymity analysis of Wang et al.'s improved scheme. © 2013 The Institution of Engineering and Technology.

Cite

CITATION STYLE

APA

Li, H., & Pang, L. (2014). Cryptanalysis of Wang et al.’s improved anonymous multi-receiver identity-based encryption scheme. IET Information Security, 8(1), 8–11. https://doi.org/10.1049/iet-ifs.2012.0354

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free