Security analysis of three cryptographic schemes from other cryptographic schemes

  • Authors:
  • Sherman S. M. Chow;Zhengjun Cao;Joseph K. Liu

  • Affiliations:
  • Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY;Key Lab of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, P.R. China;Department of Computer Science, University of Bristol, Bristol, UK

  • Venue:
  • CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group signature scheme from identity-based signature, another group signature scheme from proxy signature and a signcryption scheme from secret sharing. Unfortunately, we show that these schemes are insecure. These group signature schemes cannot satisfy at least half of the standard security requirements while the signcryption scheme does not even satisfy the basic requirement of a secure signcryption scheme. We hope this work can exhibit the precautions one should take when making schemes with a similar approach.