• Article
  • | |
  • Metrics
  • |
  • Reference [10]
  • |
  • Related
  • |
  • Cited by [2]
  • | |
  • Comments
    Abstract:

    Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm,and similar in efficiency to regular signatures.The distinguishing characteristic of chameleon signatures is that they are non-transferable,with only the designated recipient capable of asserting its validity.This paper introduces a new chameleon hash function based on bilinear pairing and builds the ID-based chameleon signature scheme.Compared with the conventional chameleon hashing functions,the owner of a public hash key in the ID-based chameleon hashing scheme does not necessarily need to retrieve the associated secret key.The scheme enjoys all the attributes in the normal chameleon signature and the added characteristics of ID-based cryptography based on bilinear pairing.

    Reference
    [1]Chaum D,Antwerpen H.Undeniable signatures.In:Brassard G.Advances in Cryptology-CRYPTO'89.Springer-Verlag,1991.212-216.
    [2]Boyar J,Chaum D,Damgard IB,Pedersen TP.Convertible undeniable signatures.In:Menezes A,Vanstone SA,eds.Advances in Cryptology-CRYPTO'90.Springer-Verlag,1990.189-205.
    [3]Chaum D.Zero-Knowledge undeniable signature.In:Damgard I,ed.Advances in Cryptology-EURPCRYPT'90.Aarhus:SpringerVerlag,1990.458-464.
    [4]Chaum D,van Heijst E,Pfitzmann B.Cryptographically strong undeniable signatures,unconditionally secure for the signer.In:Feigenbaum J,ed.Advances in Cryptology-CRYPTO'91.Springe-Verlag,1990.470-484.
    [5]Van Heijst E,Pedersen T.How to make efficient fail-stop.signatures.In:Rueppel RA,ed.Advances in Cryptology-EURPCRYPT'92.Balatonfured:Springer-Verlag,1993.366-377.
    [6]Krawczyk H,Rabin T.Chameleon signature.In:Proc.of the Network and Distributed System Security Symp.(NDSS 2000).The Internet Society,2000.143-154.
    [7]Boneh D,Franklin M.Identity-Based encryption from the Weil pairing.In:Kilian J,ed.Advances in Cryptology-CRYPTO 2001.Springer-Verlagt,2001.213-229.
    [8]Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing.In:Boyd C,ed.Advances in Cryptology-ASIACRYPT 2001.Gold Coast:Springer-Verlag,2001.514-532.
    [9]Gentry C,Silverberg A.Hierarchical ID-based cryptography.In:Zheng YL,ed.Advances in Cryptology-ASIACRYPT 2002.Queenstown:Springer-Verlag,2002.213-229.
    [10]Horwitz J,Lynn B.Toward hierarchical identity-based encryption.In:Knudsen LR,ed.Advances in Cryptology-EURPCRYPT 2002.Amsterdam:Springer-Verlag,2002.466-481.
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

杜欣军,王莹,葛建华,王育民.基于双线性对的Chameleon签名方案.软件学报,2007,18(10):2662-2668

Copy
Share
Article Metrics
  • Abstract:4238
  • PDF: 5079
  • HTML: 0
  • Cited by: 0
History
  • Received:October 13,2003
  • Revised:April 27,2006
You are the first2032651Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063