Journal
INFORMATION SCIENCES
Volume 265, Issue -, Pages 198-210Publisher
ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2013.12.020
Keywords
Chameleon hashing; Identity-based system; Key exposure
Categories
Funding
- National Natural Science Foundation of China [61272455, 61100224]
- China 111 Project [B08038]
- Fundamental Research Funds for the Central Universities [K50511010001, JY10000901034]
- ARC [FT0991397]
Ask authors/readers for more resources
The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative-answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties. (C) 2013 Elsevier Inc. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available