DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Xiaofeng | ko |
dc.contributor.author | Zhang, Fangguo | ko |
dc.contributor.author | Susilo, Willy | ko |
dc.contributor.author | Tian, Haibo | ko |
dc.contributor.author | Li, Jin | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2014-08-29T01:48:52Z | - |
dc.date.available | 2014-08-29T01:48:52Z | - |
dc.date.created | 2014-04-28 | - |
dc.date.created | 2014-04-28 | - |
dc.date.issued | 2014-05 | - |
dc.identifier.citation | INFORMATION SCIENCES, v.265, pp.198 - 210 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | http://hdl.handle.net/10203/188861 | - |
dc.description.abstract | The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative-answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties. | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | UNDENIABLE SIGNATURES | - |
dc.subject | EXACT SECURITY | - |
dc.subject | SCHEMES | - |
dc.subject | CRYPTOSYSTEMS | - |
dc.subject | HASHES | - |
dc.subject | PROOFS | - |
dc.subject | WEIL | - |
dc.title | Identity-based chameleon hashing and signatures without key exposure | - |
dc.type | Article | - |
dc.identifier.wosid | 000333502600015 | - |
dc.identifier.scopusid | 2-s2.0-84893719831 | - |
dc.type.rims | ART | - |
dc.citation.volume | 265 | - |
dc.citation.beginningpage | 198 | - |
dc.citation.endingpage | 210 | - |
dc.citation.publicationname | INFORMATION SCIENCES | - |
dc.identifier.doi | 10.1016/j.ins.2013.12.020 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Chen, Xiaofeng | - |
dc.contributor.nonIdAuthor | Zhang, Fangguo | - |
dc.contributor.nonIdAuthor | Susilo, Willy | - |
dc.contributor.nonIdAuthor | Tian, Haibo | - |
dc.contributor.nonIdAuthor | Li, Jin | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Chameleon hashing | - |
dc.subject.keywordAuthor | Identity-based system | - |
dc.subject.keywordAuthor | Key exposure | - |
dc.subject.keywordPlus | UNDENIABLE SIGNATURES | - |
dc.subject.keywordPlus | EXACT SECURITY | - |
dc.subject.keywordPlus | SCHEMES | - |
dc.subject.keywordPlus | CRYPTOSYSTEMS | - |
dc.subject.keywordPlus | HASHES | - |
dc.subject.keywordPlus | PROOFS | - |
dc.subject.keywordPlus | WEIL | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.