4.7 Article

Identity-based chameleon hashing and signatures without key exposure

Journal

INFORMATION SCIENCES
Volume 265, Issue -, Pages 198-210

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2013.12.020

Keywords

Chameleon hashing; Identity-based system; Key exposure

Funding

  1. National Natural Science Foundation of China [61272455, 61100224]
  2. China 111 Project [B08038]
  3. Fundamental Research Funds for the Central Universities [K50511010001, JY10000901034]
  4. ARC [FT0991397]

Ask authors/readers for more resources

The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative-answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties. (C) 2013 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available