Security analysis of three cryptographic schemes from other cryptographic schemes
文献类型:期刊论文
作者 | Chow, SSM; Cao, ZJ; Liu, JK |
刊名 | INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS
![]() |
出版日期 | 2005 |
卷号 | 3822页码:290-301 |
关键词 | group signature signcryption identity-based signature proxy signature secret sharing bilinear pairings |
ISSN号 | 0302-9743 |
英文摘要 | Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach. |
WOS研究方向 | Computer Science |
语种 | 英语 |
WOS记录号 | WOS:000234882000025 |
出版者 | SPRINGER-VERLAG BERLIN |
源URL | [http://ir.amss.ac.cn/handle/2S8OKBNM/1351] ![]() |
专题 | 中国科学院数学与系统科学研究院 |
通讯作者 | Chow, SSM |
作者单位 | 1.NYU, Courant Inst Math Sci, Dept Comp Sci, New York, NY 10012 USA 2.Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China 3.Univ Bristol, Dept Comp Sci, Bristol, Avon, England |
推荐引用方式 GB/T 7714 | Chow, SSM,Cao, ZJ,Liu, JK. Security analysis of three cryptographic schemes from other cryptographic schemes[J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,2005,3822:290-301. |
APA | Chow, SSM,Cao, ZJ,&Liu, JK.(2005).Security analysis of three cryptographic schemes from other cryptographic schemes.INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,3822,290-301. |
MLA | Chow, SSM,et al."Security analysis of three cryptographic schemes from other cryptographic schemes".INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS 3822(2005):290-301. |
入库方式: OAI收割
来源:数学与系统科学研究院
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。