Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
@inproceedings{Krenn2018ChameleonHashesWD, title={Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications}, author={Stephan Krenn and Henrich Christopher P{\"o}hls and Kai Samelin and Daniel Slamanig}, booktitle={AFRICACRYPT}, year={2018} }
A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoors (\(\mathsf {CHET}\); Camenisch et al., PKC 17) allow prohibiting that the holder of the long-term trapdoor can find collisions by introducing a second, ephemeral, trapdoor. However, this ephemeral trapdoor is required to be chosen freshly for each hash.
14 Citations
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions
- Computer Science, MathematicsSCN
- 2020
The results relax the requirement to not being dependent on public-key encryption and give rise to candidates of chameleon-hashes with strong collision-resistance guarantees and long-term security guarantees.
Efficient chameleon hash functions in the enhanced collision resistant model
- Computer Science, MathematicsInf. Sci.
- 2020
Fully Invisible Protean Signatures Schemes
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2019
The authors introduce the new notions of invisible RSs and invisible non-accountable SSs, along with a consolidated framework for aggregate signatures, and extend PSs to be fully invisible, guaranteeing that an outsider can identify neither editable nor redactable parts.
Policy-Based Sanitizable Signatures
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2019
This work proposes a different and more powerful approach: Instead of using sanitizers’ public keys directly, they assign attributes to them, then based on policies, a sanitizer can sanitize, if, and only if, it holds a secret key to attributes satisfying the policy associated to a signature.
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
- Computer Science, MathematicsNDSS
- 2019
PCHs generalize the notion of chameleon-hashes by giving the party computing a hash the ability to associate access policies to the generated hashes, and apply this concept to transaction-level rewriting within blockchains, and thus support fine-grained and controlled modifiability of blockchain objects.
RSA and redactable blockchains
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020
This paper offers a simple method of constructing redactable blockchains inspired by the ideas underlying the well-known RSA encryption scheme and can be used in conjunction with any reasonable hash function that is used to build a blockchain.
HUCDO: A Hybrid User-centric Data Outsourcing Scheme
- Computer ScienceACM Trans. Cyber Phys. Syst.
- 2020
This work proposes the first hybrid user-centric data outsourcing (HUCDO) scheme, which allows users to outsource data securely, efficiently, and economically via different CPSs, and are secure, efficient, and economic for users to implement while outsourcing their data via CPSs.
HUCDO
- Computer ScienceACM Transactions on Cyber-Physical Systems
- 2020
This work proposes the first hybrid user-centric data outsourcing (HUCDO) scheme, which allows users to outsource data securely, efficiently, and economically via different CPSs, and are secure, efficient, and economic for users to implement while outsourcing their data via CPSs.
Redactable Blockchain Supporting Supervision and Self-Management
- Computer Science, MathematicsAsiaCCS
- 2021
This work revisits the conflict between the immutability and redaction of blockchain, and puts forward a new fine-grained redactable blockchain with a semi-trusted regulator, who follows the protocol but has a tendency to abuse his power.
Scalable and redactable blockchain with update and anonymity
- Computer Science, MathematicsInf. Sci.
- 2021
References
SHOWING 1-10 OF 58 REFERENCES
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2017
This paper introduces the notion of chameleon-hash functions with ephemeral trapdoors, a formal security model for this new primitive as well as provably secure instantiations, and provides three direct constructions based on standard assumptions.
ID-Based Chameleon Hashes from Bilinear Pairings
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2003
This paper proposes two new ID-based Chameleon hashing schemes from bilinear pairings and analyzes their security and efficiency.
Identity-Based Chameleon Hash and Applications
- Computer Science, MathematicsFinancial Cryptography
- 2004
This paper uses the identity-based chameleon hashing scheme to build the id-basedchameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.
Identity-Based Chameleon Hash Scheme without Key Exposure
- Computer Science, MathematicsACISP
- 2009
This paper proposes the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem.
Chameleon Hashing Without Key Exposure
- Computer Science, MathematicsISC
- 2004
Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message, i.e., the designated recipient is capable of verifying the validity of the signature, but cannot disclose the contents of the signed information to convince any third party without the signer’s consent.
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring
- Computer Science, MathematicsInscrypt
- 2010
An improved chameleon hash scheme without key exposure based on factoring is proposed which enjoys all the desired security notions of chamleon hashing.
A Characterization of Chameleon Hash Functions and New, Efficient Designs
- Mathematics, Computer ScienceJournal of Cryptology
- 2013
It is shown that chameleon hash functions and Sigma protocols are equivalent, and a transform of any suitable Sigma protocol to a chamleon hash function is provided, which enables to unify previous designs of chameLeon hash functions, seeing them all as emanating from a common paradigm.
On the Key Exposure Problem in Chameleon Hashes
- Computer Science, MathematicsSCN
- 2004
This work provides several constructions of exposure-free chameleon hash functions based on different cryptographic assumptions, such as the RSA and the discrete logarithm assumptions, which may potentially be realized over a large set of cryptographic groups.
Tightly-Secure Signatures from Chameleon Hash Functions
- Computer Science, MathematicsPublic Key Cryptography
- 2015
This work shows that any Chameleon Hash function can be transformed into a (binary) tree-based signature scheme with tight security and obtains the first tightly secure signature scheme from the SIS assumption and several schemes based on Diffie-Hellman in the standard model.
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Computer Science, MathematicsACNS
- 2007
Two transforms to acquire chosen ciphertext security from tag based techniques are presented and preserve the public verifiability of underlying primitives, and can be extended to hierarchical identity based encryption (HIBE) and threshold settings.