KMS Of Academy of mathematics and systems sciences, CAS
Security analysis of three cryptographic schemes from other cryptographic schemes | |
Chow, SSM; Cao, ZJ; Liu, JK | |
2005 | |
发表期刊 | INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS
![]() |
ISSN | 0302-9743 |
卷号 | 3822页码:290-301 |
摘要 | Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach. |
关键词 | group signature signcryption identity-based signature proxy signature secret sharing bilinear pairings |
语种 | 英语 |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Information Systems ; Computer Science, Theory & Methods |
WOS记录号 | WOS:000234882000025 |
出版者 | SPRINGER-VERLAG BERLIN |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://ir.amss.ac.cn/handle/2S8OKBNM/1352 |
专题 | 中国科学院数学与系统科学研究院 |
通讯作者 | Chow, SSM |
作者单位 | 1.NYU, Courant Inst Math Sci, Dept Comp Sci, New York, NY 10012 USA 2.Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China 3.Univ Bristol, Dept Comp Sci, Bristol, Avon, England |
推荐引用方式 GB/T 7714 | Chow, SSM,Cao, ZJ,Liu, JK. Security analysis of three cryptographic schemes from other cryptographic schemes[J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,2005,3822:290-301. |
APA | Chow, SSM,Cao, ZJ,&Liu, JK.(2005).Security analysis of three cryptographic schemes from other cryptographic schemes.INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,3822,290-301. |
MLA | Chow, SSM,et al."Security analysis of three cryptographic schemes from other cryptographic schemes".INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS 3822(2005):290-301. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论