中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
Security analysis of three cryptographic schemes from other cryptographic schemes

文献类型:期刊论文

作者Chow, SSM; Cao, ZJ; Liu, JK
刊名INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS
出版日期2005
卷号3822页码:290-301
关键词group signature signcryption identity-based signature proxy signature secret sharing bilinear pairings
ISSN号0302-9743
英文摘要Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.
WOS研究方向Computer Science
语种英语
WOS记录号WOS:000234882000025
出版者SPRINGER-VERLAG BERLIN
源URL[http://ir.amss.ac.cn/handle/2S8OKBNM/1351]  
专题中国科学院数学与系统科学研究院
通讯作者Chow, SSM
作者单位1.NYU, Courant Inst Math Sci, Dept Comp Sci, New York, NY 10012 USA
2.Chinese Acad Sci, Key Lab Math Mechanizat, Acad Math & Syst Sci, Beijing, Peoples R China
3.Univ Bristol, Dept Comp Sci, Bristol, Avon, England
推荐引用方式
GB/T 7714
Chow, SSM,Cao, ZJ,Liu, JK. Security analysis of three cryptographic schemes from other cryptographic schemes[J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,2005,3822:290-301.
APA Chow, SSM,Cao, ZJ,&Liu, JK.(2005).Security analysis of three cryptographic schemes from other cryptographic schemes.INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS,3822,290-301.
MLA Chow, SSM,et al."Security analysis of three cryptographic schemes from other cryptographic schemes".INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS 3822(2005):290-301.

入库方式: OAI收割

来源:数学与系统科学研究院

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。