Identity-based chameleon hash scheme without key exposure

  • Authors:
  • Xiaofeng Chen;Fangguo Zhang;Willy Susilo;Haibo Tian;Jin Li;Kwangjo Kim

  • Affiliations:
  • Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian University, Xi'an, P.R. China;School of Information Science and Technology, Sun Yat-sen University, Guangzhou, P.R. China;School of Computer Science and Software Engineering, University of Wollongong, New South Wales, Australia;School of Information Science and Technology, Sun Yat-sen University, Guangzhou, P.R. China;School of Computer Science and Educational Software, Guangzhou University, Guangzhou, P.R. China;Department of Computer Science, KAIST, Daejeon, Korea

  • Venue:
  • ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The notion of chameleon hash function without key exposure plays an important role in designing chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem.