Sciweavers

FC
2004
Springer

Identity-Based Chameleon Hash and Applications

13 years 10 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.
Giuseppe Ateniese, Breno de Medeiros
Added 01 Jul 2010
Updated 01 Jul 2010
Type Conference
Year 2004
Where FC
Authors Giuseppe Ateniese, Breno de Medeiros
Comments (0)