Security analysis of three cryptographic schemes from other cryptographic schemes

Sherman S.M. Chow, Zhengjun Cao, Joseph K. Liu

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Abstract

Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings
Pages290-301
Number of pages12
Publication statusPublished - 1 Dec 2005
Externally publishedYes
Event1st SKLOIS Conference on Information Security and Cryptology, CISC 2005 - Beijing, China
Duration: 15 Dec 200517 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3822 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st SKLOIS Conference on Information Security and Cryptology, CISC 2005
CountryChina
CityBeijing
Period15/12/0517/12/05

Keywords

  • Bilinear pairings
  • Group signature
  • Identity-based signature
  • Proxy signature
  • Secret sharing
  • Signcryption

Cite this

Chow, S. S. M., Cao, Z., & Liu, J. K. (2005). Security analysis of three cryptographic schemes from other cryptographic schemes. In Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings (pp. 290-301). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3822 LNCS).
Chow, Sherman S.M. ; Cao, Zhengjun ; Liu, Joseph K. / Security analysis of three cryptographic schemes from other cryptographic schemes. Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. 2005. pp. 290-301 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{652147177f1047ab88bec75f8ab85843,
title = "Security analysis of three cryptographic schemes from other cryptographic schemes",
abstract = "Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.",
keywords = "Bilinear pairings, Group signature, Identity-based signature, Proxy signature, Secret sharing, Signcryption",
author = "Chow, {Sherman S.M.} and Zhengjun Cao and Liu, {Joseph K.}",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "3540308555",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "290--301",
booktitle = "Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings",

}

Chow, SSM, Cao, Z & Liu, JK 2005, Security analysis of three cryptographic schemes from other cryptographic schemes. in Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3822 LNCS, pp. 290-301, 1st SKLOIS Conference on Information Security and Cryptology, CISC 2005, Beijing, China, 15/12/05.

Security analysis of three cryptographic schemes from other cryptographic schemes. / Chow, Sherman S.M.; Cao, Zhengjun; Liu, Joseph K.

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. 2005. p. 290-301 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Security analysis of three cryptographic schemes from other cryptographic schemes

AU - Chow, Sherman S.M.

AU - Cao, Zhengjun

AU - Liu, Joseph K.

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.

AB - Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.

KW - Bilinear pairings

KW - Group signature

KW - Identity-based signature

KW - Proxy signature

KW - Secret sharing

KW - Signcryption

UR - http://www.scopus.com/inward/record.url?scp=33744924234&partnerID=8YFLogxK

M3 - Conference Paper

SN - 3540308555

SN - 9783540308553

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 290

EP - 301

BT - Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings

ER -

Chow SSM, Cao Z, Liu JK. Security analysis of three cryptographic schemes from other cryptographic schemes. In Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. 2005. p. 290-301. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).