Generic Construction of Chameleon Hash to Group Elements

نویسندگان

  • Chun-Hui Wu
  • Qin Li
  • Zhiwei Sun
  • Xueling Zhong
چکیده

—Chameleon hash functions are trapdoor one-way functions with many applications such as chameleon signatures and on-line/off-line signatures. Previous research focused on the concrete constructions based on different assumptions, as well as schemes without the key-exposure problem. In this paper, we consider the structure-preserving schemes where messages, hash value and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they can nicely compose with other algebraic tools (like the GrothSahai proof systems). We first propose a concrete structurepreserving chameleon hash from a one-time linearly homomorphic Structure-Preserving Signature (SPS), without the keyexposure free property. Then, we give a generic construction of chameleon hash from any linearly homomorphic SPS satisfying a certain template, and key-exposure freeness can be achieved when full-fledged linearly homomorphic SPS is used.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures

A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the m...

متن کامل

Multi-Designated Verifiers Signatures Revisited

Multi-Designated Verifier Signature (MDVS) is a privacy-oriented signature scheme in which the signature produced can only be verified by a specific set of users. A generic MDVS scheme was proposed recently, which can be constructed from some ring signature schemes and a secure multi-party computation (SMC) protocol. In this paper, we try to remove the requirement of the costly SMC. We propose ...

متن کامل

Identity-based chameleon hashing and signatures without key exposure

The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing keyexposure free chameleon hash schemes are presented in the setting of certificatebased systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure...

متن کامل

General Construction of Chameleon All-But-One Trapdoor Functions

Lossy trapdoor functions enable black-box construction of public key encryption (PKE) schemes secure against chosen-ciphertext attack [18]. Recently, a more efficient black-box construction of public key encryption was given in [13] with the help of chameleon all-but-one trapdoor functions (ABO-TDFs). In this paper, we propose a black-box construction for transforming any ABO-TDFs into chameleo...

متن کامل

Mitigating Phishing by a New ID-based Chameleon Hash without Key Exposure

Chameleon signatures were introduced by Krawczyk and Rabin to provide a non-transferable signature scheme. However, the nontransferability property requires the willingness of the recipient in consequentially exposing a secret key and therefore invalidating all signatures issued to the same recipient’s public key. This notion has been extended by Chen et al. to allow a “key-exposure” freeness s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCM

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2016