Identity-based chameleon hashing and signatures without key exposure

Cited 57 time in webofscience Cited 57 time in scopus
  • Hit : 1177
  • Download : 29
DC FieldValueLanguage
dc.contributor.authorChen, Xiaofengko
dc.contributor.authorZhang, Fangguoko
dc.contributor.authorSusilo, Willyko
dc.contributor.authorTian, Haiboko
dc.contributor.authorLi, Jinko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2014-08-29T01:48:52Z-
dc.date.available2014-08-29T01:48:52Z-
dc.date.created2014-04-28-
dc.date.created2014-04-28-
dc.date.issued2014-05-
dc.identifier.citationINFORMATION SCIENCES, v.265, pp.198 - 210-
dc.identifier.issn0020-0255-
dc.identifier.urihttp://hdl.handle.net/10203/188861-
dc.description.abstractThe notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative-answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectUNDENIABLE SIGNATURES-
dc.subjectEXACT SECURITY-
dc.subjectSCHEMES-
dc.subjectCRYPTOSYSTEMS-
dc.subjectHASHES-
dc.subjectPROOFS-
dc.subjectWEIL-
dc.titleIdentity-based chameleon hashing and signatures without key exposure-
dc.typeArticle-
dc.identifier.wosid000333502600015-
dc.identifier.scopusid2-s2.0-84893719831-
dc.type.rimsART-
dc.citation.volume265-
dc.citation.beginningpage198-
dc.citation.endingpage210-
dc.citation.publicationnameINFORMATION SCIENCES-
dc.identifier.doi10.1016/j.ins.2013.12.020-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorChen, Xiaofeng-
dc.contributor.nonIdAuthorZhang, Fangguo-
dc.contributor.nonIdAuthorSusilo, Willy-
dc.contributor.nonIdAuthorTian, Haibo-
dc.contributor.nonIdAuthorLi, Jin-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorChameleon hashing-
dc.subject.keywordAuthorIdentity-based system-
dc.subject.keywordAuthorKey exposure-
dc.subject.keywordPlusUNDENIABLE SIGNATURES-
dc.subject.keywordPlusEXACT SECURITY-
dc.subject.keywordPlusSCHEMES-
dc.subject.keywordPlusCRYPTOSYSTEMS-
dc.subject.keywordPlusHASHES-
dc.subject.keywordPlusPROOFS-
dc.subject.keywordPlusWEIL-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 57 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0