CryptoDB
Identity-based Chameleon Hash and Applications
Authors: | |
---|---|
Download: | |
Abstract: | Chameleon signatures are non-interactive signatures based on a hash-and-sign para\-digm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model. |
BibTeX
@misc{eprint-2003-11881, title={Identity-based Chameleon Hash and Applications}, booktitle={IACR Eprint archive}, keywords={Digital signatures, secure hash functions, chameleon hashing, sealed-bid auctions.}, url={http://eprint.iacr.org/2003/167}, note={In Financial Cryptography 2004 (FC'04) ateniese@cs.jhu.edu 12492 received 11 Aug 2003, last revised 15 Mar 2004}, author={Giuseppe Ateniese and Breno de Medeiros}, year=2003 }