Supported by the Communication Security Foundation of China under Grant Nos.J641,0130(国家通信保密基金);the National Natural Science Foundation of China under Grant No.69931010(国家自然科学基金)
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm,and similar in efficiency to regular signatures.The distinguishing characteristic of chameleon signatures is that they are non-transferable,with only the designated recipient capable of asserting its validity.This paper introduces a new chameleon hash function based on bilinear pairing and builds the ID-based chameleon signature scheme.Compared with the conventional chameleon hashing functions,the owner of a public hash key in the ID-based chameleon hashing scheme does not necessarily need to retrieve the associated secret key.The scheme enjoys all the attributes in the normal chameleon signature and the added characteristics of ID-based cryptography based on bilinear pairing.
[3]Chaum D.Zero-Knowledge undeniable signature.In:Damgard I,ed.Advances in Cryptology-EURPCRYPT'90.Aarhus:SpringerVerlag,1990.458-464.
[4]Chaum D,van Heijst E,Pfitzmann B.Cryptographically strong undeniable signatures,unconditionally secure for the signer.In:Feigenbaum J,ed.Advances in Cryptology-CRYPTO'91.Springe-Verlag,1990.470-484.
[5]Van Heijst E,Pedersen T.How to make efficient fail-stop.signatures.In:Rueppel RA,ed.Advances in Cryptology-EURPCRYPT'92.Balatonfured:Springer-Verlag,1993.366-377.
[6]Krawczyk H,Rabin T.Chameleon signature.In:Proc.of the Network and Distributed System Security Symp.(NDSS 2000).The Internet Society,2000.143-154.
[7]Boneh D,Franklin M.Identity-Based encryption from the Weil pairing.In:Kilian J,ed.Advances in Cryptology-CRYPTO 2001.Springer-Verlagt,2001.213-229.
[8]Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing.In:Boyd C,ed.Advances in Cryptology-ASIACRYPT 2001.Gold Coast:Springer-Verlag,2001.514-532.
[9]Gentry C,Silverberg A.Hierarchical ID-based cryptography.In:Zheng YL,ed.Advances in Cryptology-ASIACRYPT 2002.Queenstown:Springer-Verlag,2002.213-229.
[10]Horwitz J,Lynn B.Toward hierarchical identity-based encryption.In:Knudsen LR,ed.Advances in Cryptology-EURPCRYPT 2002.Amsterdam:Springer-Verlag,2002.466-481.