메뉴 건너뛰기




Volumn 265, Issue , 2014, Pages 198-210

Identity-based chameleon hashing and signatures without key exposure

Author keywords

Chameleon hashing; Identity based system; Key exposure

Indexed keywords

CERTIFICATE-BASED; CHAMELEON HASHING; CHAMELEON SIGNATURES; EFFICIENT CONSTRUCTION; IDENTITY-BASED; IDENTITY-BASED SYSTEMS; KEY EXPOSURE; SECURITY PROPERTIES;

EID: 84893719831     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.12.020     Document Type: Article
Times cited : (72)

References (42)
  • 1
    • 35048873387 scopus 로고    scopus 로고
    • Identity-based chameleon hash and applications
    • LNCS Springer-Verlag
    • G. Ateniese, and B. de Medeiros Identity-based chameleon hash and applications FC 2004 LNCS vol. 3110 2004 Springer-Verlag 164 180
    • (2004) FC 2004 , vol.3110 VOL. , pp. 164-180
    • Ateniese, G.1    De Medeiros, B.2
  • 2
    • 23944526438 scopus 로고    scopus 로고
    • On the key exposure problem in chameleon hashes
    • LNCS Springer-Verlag
    • G. Ateniese, and B. de Medeiros On the key exposure problem in chameleon hashes SCN 2004 LNCS vol. 3352 2005 Springer-Verlag 165 179
    • (2005) SCN 2004 , vol.3352 VOL. , pp. 165-179
    • Ateniese, G.1    De Medeiros, B.2
  • 4
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • LNCS Springer-Verlag
    • P. Barreto, H. Kim, B. Lynn, and M. Scott Efficient algorithms for pairing-based cryptosystems Advances in Cryptology-Crypto 2002 LNCS vol. 2442 2002 Springer-Verlag 354 368
    • (2002) Advances in Cryptology-Crypto 2002 , vol.2442 VOL. , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 5
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairings
    • LNCS Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairings Advances in Cryptology-Asiacrypt 2001 LNCS vol. 2248 2001 Springer-Verlag 514 532
    • (2001) Advances in Cryptology-Asiacrypt 2001 , vol.2248 VOL. , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • LNCS Springer-Verlag
    • D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing Advances in Cryptology-Crypto 2001 LNCS vol. 2139 2001 Springer-Verlag 213 229
    • (2001) Advances in Cryptology-Crypto 2001 , vol.2139 VOL. , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 0000090958 scopus 로고    scopus 로고
    • The exact security of digital signatures-How to sign with RSA and Rabin
    • LNCS Springer-Verlag
    • M. Bellare, and P. Rogaway The exact security of digital signatures-How to sign with RSA and Rabin Advances in Cryptology-Eurocrypt 1996 LNCS vol. 1070 1996 Springer-Verlag 399 416
    • (1996) Advances in Cryptology-Eurocrypt 1996 , vol.1070 VOL. , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 33646832774 scopus 로고    scopus 로고
    • Identity-based threshold decryption
    • LNCS Springer-Verlag
    • J. Baek, and Y. Zheng Identity-based threshold decryption PKC 2004 LNCS vol. 2947 2004 Springer-Verlag 248 261
    • (2004) PKC 2004 , vol.2947 VOL. , pp. 248-261
    • Baek, J.1    Zheng, Y.2
  • 9
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • LNCS Springer-Verlag
    • J. Cha, and J. Cheon An identity-based signature from gap Diffie-Hellman groups PKC 2003 LNCS vol. 2567 2003 Springer-Verlag 18 30
    • (2003) PKC 2003 , vol.2567 VOL. , pp. 18-30
    • Cha, J.1    Cheon, J.2
  • 10
    • 85043778396 scopus 로고
    • Zero-knowledge undeniable signatures
    • LNCS Springer-Verlag
    • D. Chaum Zero-knowledge undeniable signatures Advances in Cryptology-Eurocrypt 1990 LNCS vol. 473 1991 Springer-Verlag 458 464
    • (1991) Advances in Cryptology-Eurocrypt 1990 , vol.473 VOL. , pp. 458-464
    • Chaum, D.1
  • 11
    • 0002083808 scopus 로고
    • Designated confirmer signatures
    • LNCS Springer-Verlag
    • D. Chaum Designated confirmer signatures Advances in Cryptology-Eurocrypt 1994 LNCS vol. 950 1994 Springer-Verlag 86 91
    • (1994) Advances in Cryptology-Eurocrypt 1994 , vol.950 VOL. , pp. 86-91
    • Chaum, D.1
  • 13
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • LNCS Springer-Verlag
    • J. Coron On the exact security of full domain hash Advances in Cryptology-Crypto 2000 LNCS vol. 1880 2000 Springer-Verlag 229 235
    • (2000) Advances in Cryptology-Crypto 2000 , vol.1880 VOL. , pp. 229-235
    • Coron, J.1
  • 14
    • 84947955350 scopus 로고
    • Cryptographically strong undeniable signatures, unconditionally secure for the signer
    • LNCS Springer-Verlag
    • D. Chaum, E. van Heijst, and B. Pfitzmann Cryptographically strong undeniable signatures, unconditionally secure for the signer Advances in Cryptology-Crypto 1991 LNCS vol. 576 1991 Springer-Verlag 470 484
    • (1991) Advances in Cryptology-Crypto 1991 , vol.576 VOL. , pp. 470-484
    • Chaum, D.1    Van Heijst, E.2    Pfitzmann, B.3
  • 15
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • LNCS Springer-Verlag
    • D. Chaum, and T. Pedersen Wallet databases with observers Advances in Cryptology-Crypto 1992 LNCS vol. 740 1993 Springer-Verlag 89 105
    • (1993) Advances in Cryptology-Crypto 1992 , vol.740 VOL. , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 16
    • 84948967686 scopus 로고    scopus 로고
    • Confirmer signature schemes secure against adaptive adversaries
    • LNCS Springer-Verlag
    • J. Camenisch, and M. Michels Confirmer signature schemes secure against adaptive adversaries Advances in Cryptology-Eurocrypt 2000 LNCS vol. 1870 2000 Springer-Verlag 243 258
    • (2000) Advances in Cryptology-Eurocrypt 2000 , vol.1870 VOL. , pp. 243-258
    • Camenisch, J.1    Michels, M.2
  • 17
    • 35048828982 scopus 로고    scopus 로고
    • Chameleon hashing without key exposure
    • LNCS Springer-Verlag
    • X. Chen, F. Zhang, and K. Kim Chameleon hashing without key exposure ISC 2004 LNCS vol. 3225 2004 Springer-Verlag 87 98
    • (2004) ISC 2004 , vol.3225 VOL. , pp. 87-98
    • Chen, X.1    Zhang, F.2    Kim, K.3
  • 18
    • 79959994419 scopus 로고    scopus 로고
    • Discrete logarithm based chameleon hashing and signatures without key exposure
    • X. Chen, F. Zhang, H. Tian, B. Wei, and K. Kim Discrete logarithm based chameleon hashing and signatures without key exposure Comput. Electr. Eng. 37 4 2011 614 623
    • (2011) Comput. Electr. Eng. , vol.37 , Issue.4 , pp. 614-623
    • Chen, X.1    Zhang, F.2    Tian, H.3    Wei, B.4    Kim, K.5
  • 19
    • 78649844945 scopus 로고    scopus 로고
    • Identity-based chameleon hash scheme without key exposure
    • LNCS Springer-Verlag
    • X. Chen, F. Zhang, W. Susilo, H. Tian, J. Li, and K. Kim Identity-based chameleon hash scheme without key exposure ACISP 2010 LNCS vol. 6168 2010 Springer-Verlag 200 215
    • (2010) ACISP 2010 , vol.6168 VOL. , pp. 200-215
    • Chen, X.1    Zhang, F.2    Susilo, W.3    Tian, H.4    Li, J.5    Kim, K.6
  • 20
    • 79960816826 scopus 로고    scopus 로고
    • Comments and improvements on key-exposure free chameleon hashing based on factoring
    • LNCS Springer-Verlag
    • X. Chen, F. Zhang, H. Tian, and Y. Ding Comments and improvements on key-exposure free chameleon hashing based on factoring Inscrypt 2010 LNCS vol. 6584 2011 Springer-Verlag 415 426
    • (2011) Inscrypt 2010 , vol.6584 VOL. , pp. 415-426
    • Chen, X.1    Zhang, F.2    Tian, H.3    Ding, Y.4
  • 21
    • 33847010568 scopus 로고    scopus 로고
    • Chameleon hashes without key exposure based on factoring
    • W. Gao, X. Wang, and D. Xie Chameleon hashes without key exposure based on factoring J. Comput. Sci. Technol. 22 1 2007 109 113
    • (2007) J. Comput. Sci. Technol. , vol.22 , Issue.1 , pp. 109-113
    • Gao, W.1    Wang, X.2    Xie, D.3
  • 22
    • 55749094141 scopus 로고    scopus 로고
    • Chameleon hash without key exposure based on Schnorr signature
    • W. Gao, F. Li, and X. Wang Chameleon hash without key exposure based on Schnorr signature Comput. Stand. Interf. 31 2009 282 285
    • (2009) Comput. Stand. Interf. , vol.31 , pp. 282-285
    • Gao, W.1    Li, F.2    Wang, X.3
  • 23
    • 84944870499 scopus 로고    scopus 로고
    • RSA-based undeniable signatures for general moduli
    • LNCS Springer-Verlag
    • S. Galbraith, W. Mao, and K.G. Paterson RSA-based undeniable signatures for general moduli CT-RSA 2002 LNCS vol. 2271 2002 Springer-Verlag 200 217
    • (2002) CT-RSA 2002 , vol.2271 VOL. , pp. 200-217
    • Galbraith, S.1    Mao, W.2    Paterson, K.G.3
  • 24
    • 35248865251 scopus 로고    scopus 로고
    • Invisibility and anonymity of undeniable and confirmer signatures
    • LNCS Springer-Verlag
    • S. Galbraith, and W. Mao Invisibility and anonymity of undeniable and confirmer signatures CT-RSA 2003 LNCS vol. 2612 2003 Springer-Verlag 80 97
    • (2003) CT-RSA 2003 , vol.2612 VOL. , pp. 80-97
    • Galbraith, S.1    Mao, W.2
  • 26
    • 26444461753 scopus 로고    scopus 로고
    • Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-In-The-Middle attacks
    • LNCS Springer-Verlag
    • R. Gennaro Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks Advances in Cryptology-Crypto 2004 LNCS vol. 3152 2004 Springer-Verlag 220 236
    • (2004) Advances in Cryptology-Crypto 2004 , vol.3152 VOL. , pp. 220-236
    • Gennaro, R.1
  • 27
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • LNCS Springer-Verlag
    • F. Hess Efficient identity based signature schemes based on pairings SAC 2002 LNCS vol. 2595 2002 Springer-Verlag 310 324
    • (2002) SAC 2002 , vol.2595 VOL. , pp. 310-324
    • Hess, F.1
  • 28
    • 0002914851 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • LNCS Springer-Verlag
    • M. Jakobsson, K. Sako, and R. Impagliazzo Designated verifier proofs and their applications Advances in Cryptology-Eurocrypt 1996 LNCS vol. 1070 1996 Springer-Verlag 143 154
    • (1996) Advances in Cryptology-Eurocrypt 1996 , vol.1070 VOL. , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 29
    • 84958550160 scopus 로고    scopus 로고
    • The Weil and Tate pairings as building blocks for public key cryptosystems
    • LNCS Springer-Verlag
    • A. Joux The Weil and Tate pairings as building blocks for public key cryptosystems ANTS 2002 LNCS vol. 2369 2002 Springer-Verlag 20 32
    • (2002) ANTS 2002 , vol.2369 VOL. , pp. 20-32
    • Joux, A.1
  • 30
    • 24944515454 scopus 로고    scopus 로고
    • 3-Move undeniable signature scheme
    • LNCS Springer-Verlag
    • K. Kurosawa, and S. Heng 3-Move undeniable signature scheme Advances in Cryptology-Eurocrypt 2005 LNCS vol. 3494 2005 Springer-Verlag 181 197
    • (2005) Advances in Cryptology-Eurocrypt 2005 , vol.3494 VOL. , pp. 181-197
    • Kurosawa, K.1    Heng, S.2
  • 31
    • 33750022061 scopus 로고    scopus 로고
    • Relations among security notions for undeniable signature schemes
    • LNCS Springer-Verlag
    • K. Kurosawa, and S. Heng Relations among security notions for undeniable signature schemes SCN 2006 LNCS vol. 4116 2006 Springer-Verlag 34 48
    • (2006) SCN 2006 , vol.4116 VOL. , pp. 34-48
    • Kurosawa, K.1    Heng, S.2
  • 33
    • 23944478290 scopus 로고    scopus 로고
    • ID-based undeniable signatures
    • LNCS Springer-Verlag
    • B. Libert, and J. Quisquater ID-based undeniable signatures CT-RSA 2004 LNCS vol. 2694 2004 Springer-Verlag 112 125
    • (2004) CT-RSA 2004 , vol.2694 VOL. , pp. 112-125
    • Libert, B.1    Quisquater, J.2
  • 34
    • 22144445920 scopus 로고    scopus 로고
    • The Weil pairing, and its efficient calculation
    • V. Miller The Weil pairing, and its efficient calculation J. Cryptol. 17 4 2004 235 261
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.1
  • 35
    • 35048904095 scopus 로고    scopus 로고
    • Generic homomorphic undeniable signatures
    • LNCS Springer-Verlag
    • J. Monnerat, and S. Vaudenay Generic homomorphic undeniable signatures Advances in Cryptology-Asiacrypt 2004 LNCS vol. 3329 2004 Springer-Verlag 354 371
    • (2004) Advances in Cryptology-Asiacrypt 2004 , vol.3329 VOL. , pp. 354-371
    • Monnerat, J.1    Vaudenay, S.2
  • 36
    • 24144448778 scopus 로고    scopus 로고
    • The security of the FDH variant of Chaum's undeniable signature scheme
    • LNCS Springer-Verlag
    • W. Ogata, K. Kurosawa, and S. Heng The security of the FDH variant of Chaum's undeniable signature scheme PKC 2005 LNCS vol. 3386 2005 Springer-Verlag 328 345
    • (2005) PKC 2005 , vol.3386 VOL. , pp. 328-345
    • Ogata, W.1    Kurosawa, K.2    Heng, S.3
  • 37
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • LNCS Springer-Verlag
    • T. Okamoto, and D. Pointcheval The gap-problems: a new class of problems for the security of cryptographic schemes PKC 2001 LNCS vol. 1992 2001 Springer-Verlag 104 118
    • (2001) PKC 2001 , vol.1992 VOL. , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 39
    • 0000089246 scopus 로고
    • Efficient signature generation for smart cards
    • C.P. Schnorr Efficient signature generation for smart cards J. Cryptol. 4 3 1991 239 252
    • (1991) J. Cryptol. , vol.4 , Issue.3 , pp. 239-252
    • Schnorr, C.P.1
  • 41
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS Springer-Verlag
    • A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology-Crypto 1984 LNCS vol. 196 1984 Springer-Verlag 47 53
    • (1984) Advances in Cryptology-Crypto 1984 , vol.196 VOL. , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.