Security analysis of three cryptographic schemes from other cryptographic schemes

Sherman S.M. Chow, Zhengjun Cao, Joseph K. Liu

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Abstract

Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings
Pages290-301
Number of pages12
Publication statusPublished - 1 Dec 2005
Externally publishedYes
Event1st SKLOIS Conference on Information Security and Cryptology, CISC 2005 - Beijing, China
Duration: 15 Dec 200517 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3822 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st SKLOIS Conference on Information Security and Cryptology, CISC 2005
CountryChina
CityBeijing
Period15/12/0517/12/05

Keywords

  • Bilinear pairings
  • Group signature
  • Identity-based signature
  • Proxy signature
  • Secret sharing
  • Signcryption

Cite this