Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring

نویسندگان

  • Xiaofeng Chen
  • Haibo Tian
  • Fangguo Zhang
چکیده

In this paper, we present some security flaws of the keyexposure free chameleon hash scheme based on factoring [9]. Besides, we propose an improved chameleon hash scheme without key exposure based on factoring which enjoys all the desired security notions of chameleon hashing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-based chameleon hashing and signatures without key exposure

The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing keyexposure free chameleon hash schemes are presented in the setting of certificatebased systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure...

متن کامل

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems

Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chameleon signatures suffer from the problem of key exposure. This creates a strong disincentive for the recipient to forge signatures, partially undermining the concept of non-transferability. Recently, some specific constructions of...

متن کامل

Discrete logarithm based chameleon hashing and signatures without key exposure

Article history: Received 8 April 2010 Received in revised form 18 March 2011 Accepted 28 March 2011 Available online 6 May 2011 0045-7906/$ see front matter 2011 Elsevier Ltd doi:10.1016/j.compeleceng.2011.03.011 q Reviews processed and approved for publication ⇑ Corresponding author. E-mail address: [email protected] (X. Chen). Chameleon signatures simultaneously provide the properties of ...

متن کامل

Chameleon Hashing Without Key Exposure

Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message, i.e., the designated recipient is capable of verifying the validity of the signature, but cannot disclose the co...

متن کامل

ID-Based Chameleon Hashes from Bilinear Pairings

Chameleon hash function is a trapdoor one-way hash function. The IDbased chameleon hash function was first introduced by Ateniese and Medeiros [1]. As discussed by [1], the general advantages of ID-based cryptography over conventional cryptography with respect to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009