Sciweavers

Share
ISW
2004
Springer

Chameleon Hashing Without Key Exposure

10 years 1 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message, i.e., the designated recipient is capable of verifying the validity of the signature, but cannot disclose the contents of the signed information to convince any third party without the signer’s consent. One disadvantage of the initial chameleon signature scheme is that signature forgery results in the signer recovering the recipient’s trapdoor information, i.e., private key. Therefore, the signer can use this information to deny other signatures given to the recipient. This creates a strong disincentive for the recipient to forge signatures, partially undermining the concept of non-transferability. In this paper, we firstly propose a chameleon hashing scheme in the gap Diffie-Hellman group t...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where ISW
Authors Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
Comments (0)
books