Abstract
Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.
| Original language | English |
|---|---|
| Title of host publication | Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings |
| Pages | 290-301 |
| Number of pages | 12 |
| Publication status | Published - 1 Dec 2005 |
| Externally published | Yes |
| Event | SKLOIS Conference on Information Security and Cryptology 2005 - Beijing, China Duration: 15 Dec 2005 → 17 Dec 2005 Conference number: 1st |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 3822 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | SKLOIS Conference on Information Security and Cryptology 2005 |
|---|---|
| Abbreviated title | CISC 2005 |
| Country/Territory | China |
| City | Beijing |
| Period | 15/12/05 → 17/12/05 |
Keywords
- Bilinear pairings
- Group signature
- Identity-based signature
- Proxy signature
- Secret sharing
- Signcryption