Back to Search
Start Over
Identity-based chameleon hashing and signatures without key exposure
- Source :
- Information Sciences. 265:198-210
- Publication Year :
- 2014
- Publisher :
- Elsevier BV, 2014.
-
Abstract
- The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties.
- Subjects :
- Scheme (programming language)
Information Systems and Management
Hash function
Computer security
computer.software_genre
Certificate
Signature (logic)
Computer Science Applications
Theoretical Computer Science
Artificial Intelligence
Control and Systems Engineering
Identity (object-oriented programming)
Key (cryptography)
Cryptosystem
Concrete security
computer
Software
Mathematics
computer.programming_language
Subjects
Details
- ISSN :
- 00200255
- Volume :
- 265
- Database :
- OpenAIRE
- Journal :
- Information Sciences
- Accession number :
- edsair.doi...........6dfc27962128d4e9c6d1d5a05ce7d091