Skip to main content
placeholder image

Identity-based chameleon hashing and signatures without key exposure

Journal Article


Download full-text (Open Access)

Abstract


  • The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure.

    In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties.

UOW Authors


  •   Chen, Xiaofeng (external author)
  •   Zhang, Fangguo (external author)
  •   Susilo, Willy
  •   Tian, Haibo (external author)
  •   Li, Jin (external author)
  •   Kim, Kwangjo (external author)

Publication Date


  • 2014

Citation


  • Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J. & Kim, K. (2014). Identity-based chameleon hashing and signatures without key exposure. Information Sciences, 265 (May), 198-210.

Scopus Eid


  • 2-s2.0-84893719831

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3229&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2220

Has Global Citation Frequency


Number Of Pages


  • 12

Start Page


  • 198

End Page


  • 210

Volume


  • 265

Issue


  • May

Place Of Publication


  • United States

Abstract


  • The notion of chameleon hash function without key exposure plays an important role in designing secure chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure.

    In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. Moreover, we use the proposed chameleon hash scheme to design an identity-based chameleon signature scheme, which achieves all the desired security properties.

UOW Authors


  •   Chen, Xiaofeng (external author)
  •   Zhang, Fangguo (external author)
  •   Susilo, Willy
  •   Tian, Haibo (external author)
  •   Li, Jin (external author)
  •   Kim, Kwangjo (external author)

Publication Date


  • 2014

Citation


  • Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J. & Kim, K. (2014). Identity-based chameleon hashing and signatures without key exposure. Information Sciences, 265 (May), 198-210.

Scopus Eid


  • 2-s2.0-84893719831

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3229&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2220

Has Global Citation Frequency


Number Of Pages


  • 12

Start Page


  • 198

End Page


  • 210

Volume


  • 265

Issue


  • May

Place Of Publication


  • United States