Identity-based chameleon hash scheme without key exposure

Cited 27 time in webofscience Cited 0 time in scopus
  • Hit : 357
  • Download : 0
The notion of chameleon hash function without key exposure plays an important role in designing chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2009, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem.
Publisher
ACISP 2010
Issue Date
2010-07-05
Language
English
Citation

15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215

ISSN
0302-9743
URI
http://hdl.handle.net/10203/164987
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 27 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0