Sciweavers

Share
FC
2004
Springer

Identity-Based Chameleon Hash and Applications

10 years 4 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.
Giuseppe Ateniese, Breno de Medeiros
Added 01 Jul 2010
Updated 01 Jul 2010
Type Conference
Year 2004
Where FC
Authors Giuseppe Ateniese, Breno de Medeiros
Comments (0)
books