Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network

  Advanced Search  

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Summary: Identity-based Chameleon Hash and Applications
Giuseppe Ateniese Breno de Medeiros
{ateniese, breno}@cs.jhu.edu
Department of Computer Science
The Johns Hopkins University
Abstract. Chameleon signatures are non-interactive signatures based on
a hash-and-sign paradigm, and similar in efficiency to regular signatures.
The distinguishing characteristic of chameleon signatures is that their are
non-transferable, with only the designated recipient capable of asserting
its validity. In this paper, we introduce the first identity-based chameleon
hash function. The general advantages of identity-based cryptography
over conventional schemes relative to key distribution are even more pro-
nounced in a chameleon hashing scheme, because the owner of a public
key does not necessarily need to retrieve the associated secret key. We
use the identity-based chameleon hashing scheme to build the id-based
chameleon signature and a novel sealed-bid auction scheme that is ro-
bust, communication efficient (bidders send a single message), and secure
under a particular trust model.
Keywords: Digital signatures, secure hash functions, chameleon hashing, sealed-
bid auctions


Source: Ateniese, Giuseppe - Department of Computer Science, Johns Hopkins University
International Association for Cryptologic Research (IACR) - Cryptology ePrint Archive


Collections: Computer Technologies and Information Sciences; Multidisciplinary Databases and Resources