Identity-based chameleon hash and applications

Giuseppe Ateniese, Breno De Medeiros

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

146 Scopus citations

Abstract

Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsAri Juels
Pages164-180
Number of pages17
DOIs
StatePublished - 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3110
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Chameleon hashing
  • Digital signatures
  • Sealed-bid auctions
  • Secure hash functions

Fingerprint

Dive into the research topics of 'Identity-based chameleon hash and applications'. Together they form a unique fingerprint.

Cite this