CSpace
Security analysis of three cryptographic schemes from other cryptographic schemes
Chow, SSM; Cao, ZJ; Liu, JK
2005
发表期刊INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS
ISSN0302-9743
卷号3822页码:290-301
摘要Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.
关键词group signature signcryption identity-based signature proxy signature secret sharing bilinear pairings
语种英语
WOS研究方向Computer Science
WOS类目Computer Science, Information Systems ; Computer Science, Theory & Methods
WOS记录号WOS:000234882000025
出版者SPRINGER-VERLAG BERLIN
引用统计
文献类型期刊论文
条目标识符http://ir.amss.ac.cn/handle/2S8OKBNM/1352
专题中国科学院数学与系统科学研究院
通讯作者Chow, SSM
作者单位1.NYU, Courant Inst Math Sci, Dept Comp Sci, New York, NY 10012 USA
2.Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China
3.Univ Bristol, Dept Comp Sci, Bristol, Avon, England
推荐引用方式
GB/T 7714
Chow, SSM,Cao, ZJ,Liu, JK. Security analysis of three cryptographic schemes from other cryptographic schemes[J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,2005,3822:290-301.
APA Chow, SSM,Cao, ZJ,&Liu, JK.(2005).Security analysis of three cryptographic schemes from other cryptographic schemes.INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,3822,290-301.
MLA Chow, SSM,et al."Security analysis of three cryptographic schemes from other cryptographic schemes".INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS 3822(2005):290-301.
条目包含的文件
条目无相关文件。
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Chow, SSM]的文章
[Cao, ZJ]的文章
[Liu, JK]的文章
百度学术
百度学术中相似的文章
[Chow, SSM]的文章
[Cao, ZJ]的文章
[Liu, JK]的文章
必应学术
必应学术中相似的文章
[Chow, SSM]的文章
[Cao, ZJ]的文章
[Liu, JK]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。