Chameleon hashes without key exposure based on factoring

被引:13
|
作者
Gao, Wei [1 ]
Wang, Xue-Li
Xie, Dong-Qing
机构
[1] Hunan Univ, Sch Math & Econometr, Changsha 410082, Peoples R China
[2] S China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
[3] Hunan Univ, Sch Comp & Commun, Changsha 410082, Peoples R China
关键词
chameleon signature; chameleon hash; key-exposure;
D O I
10.1007/s11390-007-9015-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Chameleon hash is the main primitive to construct a chameleon signature scheme which provides nonrepudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the key exposure problem: non-transferability is based on an unsound assumption that the designated receiver is willing to abuse his private key regardless of its exposure. Recently, several key-exposure- free chameleon hashes have been constructed based on RSA assumption and SDH (strong Diffie-Hellman) assumption. In this paper, we propose a factoring-based chameleon hash scheme which is proven to enjoy all advantages of the previous schemes. In order to support it, we propose a variant Rabin signature scheme which is proven secure against a new type of attack in the random oracle model.
引用
收藏
页码:109 / 113
页数:5
相关论文
共 50 条
  • [31] Random key authentication scheme based on factoring integer and its applications
    Chen, Qin
    Ding, Hong
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (08):
  • [32] A key recovery system as secure as factoring
    Young, A
    Yung, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 129 - 142
  • [33] Factoring Cycling in Transportation Infrastructure: Design Considerations Based on Risk Exposure
    Khan, Ata M.
    Langlois, Robert G.
    ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 2011, 81 (08): : 49 - 53
  • [34] Deciding properties of polynomials without factoring
    Sander, T
    Shokrollahi, MA
    38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 46 - 55
  • [35] Security enhancement of visual hashes through key dependent wavelet transformations
    Meixner, A
    Uhl, A
    IMAGE ANALYSIS AND PROCESSING - ICIAP 2005, PROCEEDINGS, 2005, 3617 : 543 - 550
  • [36] Efficient online/offline signcryption without key exposure
    Yan, Fei
    Chen, Xiaofeng
    Zhang, Yinghui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (01) : 85 - 93
  • [37] An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure
    Sun, Yi
    Chen, Xingyuan
    Du, Xuehui
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2851 - 2856
  • [38] A New Design Public Key Encryption Scheme Based on Factoring and Discrete Logarithm Problems
    Ismail, E. S.
    Hijazi, M. S. N.
    Hashim, I.
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 230 - 233
  • [39] HoneyHash: Honeyword Generation Based on Transformed Hashes
    Shi, Canyang
    Sun, Huiping
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 161 - 173
  • [40] Linearization attacks against syndrome based hashes
    Saarinen, Markku-Juhani O.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 1 - 9