On the key exposure problem in chameleon hashes

Giuseppe Ateniese, Breno De Medeiros

Research output: Contribution to journalConference articlepeer-review

159 Scopus citations

Abstract

Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a chameleon hash that suffers from a key exposure problem: The non-transferability property requires willingness of the recipient in consequentially exposing a secret key, and therefore invalidating all signatures issued to the same recipient's public key. To address this key-revocation issue, and its attending problems of key redistribution, storage of state information, and greater need for interaction, an identity-based scheme was proposed in [1], while a fully key-exposure free construction, based on the elliptic curves with pairings, appeared later in [7]. Herein we provide several constructions of exposure-free chameleon hash functions based on different cryptographic assumptions, such as the RSA and the discrete logarithm assumptions. One of the schemes is a novel construction that relies on a single trapdoor and therefore may potentially be realized over a large set of cryptographic groups (where the discrete logarithm is hard).

Original languageEnglish
Pages (from-to)165-179
Number of pages15
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3352
DOIs
StatePublished - 2005
Event4th International Conference on Security in Communication Networks, SCN 2004 - Amalfi, Italy
Duration: 8 Sep 200410 Sep 2004

Keywords

  • Chameleon hashing
  • Chameleon signatures
  • Collision-resistant hashing
  • Digital signatures
  • Trapdoor commitments
  • Undeniable signatures

Fingerprint

Dive into the research topics of 'On the key exposure problem in chameleon hashes'. Together they form a unique fingerprint.

Cite this