Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

被引:115
作者
Camenisch, Jan [1 ]
Derler, David [2 ]
Krenn, Stephan [3 ]
Pohls, Henrich C. [4 ]
Samelin, Kai [5 ]
Slamanig, Daniel [1 ,2 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] AIT Austrian Inst Technol GmbH, Vienna, Austria
[4] Univ Passau, ISL & Chair IT Secur, Passau, Germany
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II | 2017年 / 10175卷
关键词
LINE SIGNATURES; SECURE; PRIVACY;
D O I
10.1007/978-3-662-54388-7_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with the ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.
引用
收藏
页码:152 / 182
页数:31
相关论文
共 61 条
[1]   Tag-KEM/DEM: A new framework for hybrid encryption [J].
Abe, Masayuki ;
Gennaro, Rosario ;
Kurosawa, Kaoru .
JOURNAL OF CRYPTOLOGY, 2008, 21 (01) :97-130
[2]  
Ahn JH, 2012, LECT NOTES COMPUT SC, V7194, P1, DOI 10.1007/978-3-642-28914-9_1
[3]  
Alsouri S, 2010, LECT NOTES COMPUT SC, V6101, P63, DOI 10.1007/978-3-642-13869-0_5
[4]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3679, P159
[5]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[6]  
Ateniese G, 2004, LECT NOTES COMPUT SC, V3110, P164
[7]  
Ateniese G, 2016, REDACTABLE BLOCKCHAI, P757
[8]  
Bao F, 2011, LECT NOTES COMPUT SC, V6715, P201, DOI 10.1007/978-3-642-21554-4_12
[9]   A Characterization of Chameleon Hash Functions and New, Efficient Designs [J].
Bellare, Mihir ;
Ristov, Todor .
JOURNAL OF CRYPTOLOGY, 2014, 27 (04) :799-823
[10]   Cryptographically Enforced Four-Eyes Principle [J].
Bilzhause, Arne ;
Huber, Manuel ;
Poehls, Henrich C. ;
Samelin, Kai .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :760-767