Identity-Based Chameleon Hash and Applications
نویسندگان
چکیده
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.
منابع مشابه
Identity-based chameleon hashing and signatures without key exposure
The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing keyexposure free chameleon hash schemes are presented in the setting of certificatebased systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure...
متن کاملMitigating Phishing by a New ID-based Chameleon Hash without Key Exposure
Chameleon signatures were introduced by Krawczyk and Rabin to provide a non-transferable signature scheme. However, the nontransferability property requires the willingness of the recipient in consequentially exposing a secret key and therefore invalidating all signatures issued to the same recipient’s public key. This notion has been extended by Chen et al. to allow a “key-exposure” freeness s...
متن کاملHierarchical Identity-Based Chameleon Hash and Its Applications
At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without inter...
متن کاملAn Efficient Identity-based Signature Scheme and Its Applications
Mapping messages or user’s identity into a point on elliptic curves is required in many pairing-based cryptographic schemes. In most of these pairing-based schemes, this requirement is realized by a special hash function called MapToPoint function. However, the efficiency of the MapToPoint function is much lower than the general hash functions. In this paper, we propose a new identity-based sig...
متن کاملIdentity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Medeiros in 2004.
متن کامل