University of Wollongong
Browse

Identity-based chameleon hashing and signatures without key exposure

Download (259.5 kB)
journal contribution
posted on 2024-11-16, 09:05 authored by Xiaofeng Xiaofeng Chen, Fangguo Zhang, Willy SusiloWilly Susilo, Haibo Tian, Jin Li, Kwangjo Kim
The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties.

Funding

Secure and Efficient Fair Exchange Protocols

Australian Research Council

Find out more...

History

Citation

Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J. & Kim, K. (2014). Identity-based chameleon hashing and signatures without key exposure. Information Sciences, 265 (May), 198-210.

Journal title

Information Sciences

Volume

265

Pagination

198-210

Language

English

RIS ID

85972

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC