Document Type

Journal Article

Publication Details

Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J. & Kim, K. (2010). Identity-based chameleon hash scheme without key exposure. P. Hawkes & R. Steinfeld In Information Security and Privacy: 15th Australasian Conference, ACISP 2010, 5-7 Jul, 2010, Sydney, Australia. Lecture Notes in Computer Science, 6168 200-215.


The notion of chameleon hash function without key exposure plays an important role in designing chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem.