Chameleon hashes without key exposure based on factoring

被引:13
|
作者
Gao, Wei [1 ]
Wang, Xue-Li
Xie, Dong-Qing
机构
[1] Hunan Univ, Sch Math & Econometr, Changsha 410082, Peoples R China
[2] S China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
[3] Hunan Univ, Sch Comp & Commun, Changsha 410082, Peoples R China
关键词
chameleon signature; chameleon hash; key-exposure;
D O I
10.1007/s11390-007-9015-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Chameleon hash is the main primitive to construct a chameleon signature scheme which provides nonrepudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the key exposure problem: non-transferability is based on an unsound assumption that the designated receiver is willing to abuse his private key regardless of its exposure. Recently, several key-exposure- free chameleon hashes have been constructed based on RSA assumption and SDH (strong Diffie-Hellman) assumption. In this paper, we propose a factoring-based chameleon hash scheme which is proven to enjoy all advantages of the previous schemes. In order to support it, we propose a variant Rabin signature scheme which is proven secure against a new type of attack in the random oracle model.
引用
收藏
页码:109 / 113
页数:5
相关论文
共 50 条
  • [21] PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH BASED ON FACTORING
    Luo, Wenjun
    Tan, Jianming
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1245 - 1247
  • [22] A public key encryption scheme based on factoring and discrete logarithm
    Poulakis, Dimitrios
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (06): : 745 - 752
  • [23] Multiple hashes of single key with passcode for multiple accounts
    LEE Kok-wah
    EWE Hong-tat
    Journal of Zhejiang University(Science A:An International Applied Physics & Engineering Journal), 2007, (08) : 1183 - 1190
  • [24] Multiple hashes of single key with passcode for multiple accounts
    Lee, Kok-Wah
    Ewe, Hong-Tat
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2007, 8 (08): : 1183 - 1190
  • [25] Multiple hashes of single key with passcode for multiple accounts
    Kok-wah Lee
    Hong-tat Ewe
    Journal of Zhejiang University-SCIENCE A, 2007, 8 : 1183 - 1190
  • [26] Chameleon Hash Based Efficiently Updatable Oblivious Key Management
    Wang, Zhiwei
    Lan, Longwen
    Yiu, Siuming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4503 - 4513
  • [27] Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain
    Wu, Chunhui
    Ke, Lishan
    Du, Yusong
    INFORMATION SCIENCES, 2021, 548 : 438 - 449
  • [28] CCA-SECURE KEY ENCAPSULATION MECHANISM BASED ON FACTORING ASSUMPTION
    Marton, Gyoengyver
    TATRACRYPT '12, 2012, 53 : 137 - 146
  • [29] Public-key cryptosystem design based on factoring and discrete logarithms
    Tu, K
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1996, 143 (01): : 96 - 96
  • [30] PUBLIC-KEY CRYPTOSYSTEM DESIGN BASED ON FACTORING AND DISCRETE LOGARITHMS
    HARN, L
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (03): : 193 - 195