Chameleon hashes without key exposure based on factoring

被引:13
|
作者
Gao, Wei [1 ]
Wang, Xue-Li
Xie, Dong-Qing
机构
[1] Hunan Univ, Sch Math & Econometr, Changsha 410082, Peoples R China
[2] S China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
[3] Hunan Univ, Sch Comp & Commun, Changsha 410082, Peoples R China
关键词
chameleon signature; chameleon hash; key-exposure;
D O I
10.1007/s11390-007-9015-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Chameleon hash is the main primitive to construct a chameleon signature scheme which provides nonrepudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the key exposure problem: non-transferability is based on an unsound assumption that the designated receiver is willing to abuse his private key regardless of its exposure. Recently, several key-exposure- free chameleon hashes have been constructed based on RSA assumption and SDH (strong Diffie-Hellman) assumption. In this paper, we propose a factoring-based chameleon hash scheme which is proven to enjoy all advantages of the previous schemes. In order to support it, we propose a variant Rabin signature scheme which is proven secure against a new type of attack in the random oracle model.
引用
收藏
页码:109 / 113
页数:5
相关论文
共 50 条
  • [1] Chameleon Hashes Without Key Exposure Based on Factoring
    Wei Gao
    Xue-Li Wang
    Dong-Qing Xie
    Journal of Computer Science and Technology, 2007, 22 : 109 - 113
  • [2] On the key exposure problem in chameleon hashes
    Ateniese, G
    de Medeiros, B
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 165 - 179
  • [3] Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring
    Chen, Xiaofeng
    Tian, Haibo
    Zhang, Fangguo
    Ding, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 415 - +
  • [4] Chameleon hashing without key exposure
    Chen, XF
    Zhang, FG
    Kim, K
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 87 - 98
  • [5] Chameleon hash without key exposure based on Schnorr signature
    Gao, Wei
    Li, Fei
    Wang, Xueli
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 282 - 285
  • [6] Identity-based chameleon hashing and signatures without key exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    Tian, Haibo
    Li, Jin
    Kim, Kwangjo
    INFORMATION SCIENCES, 2014, 265 : 198 - 210
  • [7] Identity-Based Chameleon Hash Scheme without Key Exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    Tian, Haibo
    Li, Jin
    Kim, Kwangjo
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 200 - +
  • [8] Discrete logarithm based chameleon hashing and signatures without key exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Tian, Haibo
    Wei, Baodian
    Kim, Kwangjo
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 614 - 623
  • [9] A Secure Chameleon Hash Function without Key Exposure from Pairings
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 15 - 18
  • [10] Verifiable image revision from chameleon hashes
    Xu, Junpeng
    Chen, Haixia
    Yang, Xu
    Wu, Wei
    Song, Yongcheng
    CYBERSECURITY, 2021, 4 (01)