Identity-based chameleon hashing and signatures without key exposure

Cited 57 time in webofscience Cited 57 time in scopus
  • Hit : 1180
  • Download : 29
The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative-answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties.
Publisher
ELSEVIER SCIENCE INC
Issue Date
2014-05
Language
English
Article Type
Article
Keywords

UNDENIABLE SIGNATURES; EXACT SECURITY; SCHEMES; CRYPTOSYSTEMS; HASHES; PROOFS; WEIL

Citation

INFORMATION SCIENCES, v.265, pp.198 - 210

ISSN
0020-0255
DOI
10.1016/j.ins.2013.12.020
URI
http://hdl.handle.net/10203/188861
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 57 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0