@inproceedings{652147177f1047ab88bec75f8ab85843,
title = "Security analysis of three cryptographic schemes from other cryptographic schemes",
abstract = "Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.",
keywords = "Bilinear pairings, Group signature, Identity-based signature, Proxy signature, Secret sharing, Signcryption",
author = "Chow, {Sherman S.M.} and Zhengjun Cao and Liu, {Joseph K.}",
year = "2005",
month = dec,
day = "1",
language = "English",
isbn = "3540308555",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "290--301",
booktitle = "Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings",
note = "1st SKLOIS Conference on Information Security and Cryptology, CISC 2005 ; Conference date: 15-12-2005 Through 17-12-2005",
}