Generic Construction of Chameleon Hash to Group Elements
نویسندگان
چکیده
—Chameleon hash functions are trapdoor one-way functions with many applications such as chameleon signatures and on-line/off-line signatures. Previous research focused on the concrete constructions based on different assumptions, as well as schemes without the key-exposure problem. In this paper, we consider the structure-preserving schemes where messages, hash value and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they can nicely compose with other algebraic tools (like the GrothSahai proof systems). We first propose a concrete structurepreserving chameleon hash from a one-time linearly homomorphic Structure-Preserving Signature (SPS), without the keyexposure free property. Then, we give a generic construction of chameleon hash from any linearly homomorphic SPS satisfying a certain template, and key-exposure freeness can be achieved when full-fledged linearly homomorphic SPS is used.
منابع مشابه
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the m...
متن کاملMulti-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signature (MDVS) is a privacy-oriented signature scheme in which the signature produced can only be verified by a specific set of users. A generic MDVS scheme was proposed recently, which can be constructed from some ring signature schemes and a secure multi-party computation (SMC) protocol. In this paper, we try to remove the requirement of the costly SMC. We propose ...
متن کاملIdentity-based chameleon hashing and signatures without key exposure
The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing keyexposure free chameleon hash schemes are presented in the setting of certificatebased systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure...
متن کاملGeneral Construction of Chameleon All-But-One Trapdoor Functions
Lossy trapdoor functions enable black-box construction of public key encryption (PKE) schemes secure against chosen-ciphertext attack [18]. Recently, a more efficient black-box construction of public key encryption was given in [13] with the help of chameleon all-but-one trapdoor functions (ABO-TDFs). In this paper, we propose a black-box construction for transforming any ABO-TDFs into chameleo...
متن کاملMitigating Phishing by a New ID-based Chameleon Hash without Key Exposure
Chameleon signatures were introduced by Krawczyk and Rabin to provide a non-transferable signature scheme. However, the nontransferability property requires the willingness of the recipient in consequentially exposing a secret key and therefore invalidating all signatures issued to the same recipient’s public key. This notion has been extended by Chen et al. to allow a “key-exposure” freeness s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCM
دوره 11 شماره
صفحات -
تاریخ انتشار 2016