Discrete logarithm based chameleon hashing and signatures without key exposure

Cited 19 time in webofscience Cited 0 time in scopus
  • Hit : 928
  • Download : 0
Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message. However, the initial constructions of chameleon signatures suffer from the key exposure problem of chameleon hashing. This creates a strong disincentive for the recipient to compute hash collisions, partially undermining the concept of non-transferability. Recently, some constructions of discrete logarithm based chameleon hashing and signatures without key exposure are presented, while in the setting of gap Diffie-Hellman groups with pairings. In this paper, we propose the first key-exposure free chameleon hash and signature scheme based on discrete logarithm systems, without using the gap Diffie-Hellman groups. This provides more flexible constructions of efficient key-exposure free chameleon hash and signature schemes. Moreover, one distinguishing advantage of the resulting chameleon signature scheme is that the property of "message hiding" or "message recovery" can be achieved freely by the signer, i.e., the signer can efficiently prove which message was the original one if he desires. (C) 2011 Elsevier Ltd. All rights reserved.
Publisher
PERGAMON-ELSEVIER SCIENCE LTD
Issue Date
2011-07
Language
English
Article Type
Article
Keywords

EXACT SECURITY; SCHEMES

Citation

COMPUTERS ELECTRICAL ENGINEERING, v.37, no.4, pp.614 - 623

ISSN
0045-7906
URI
http://hdl.handle.net/10203/100979
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 19 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0