Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

被引:104
作者
Camenisch, Jan [1 ]
Derler, David [2 ]
Krenn, Stephan [3 ]
Pohls, Henrich C. [4 ]
Samelin, Kai [5 ]
Slamanig, Daniel [1 ,2 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] AIT Austrian Inst Technol GmbH, Vienna, Austria
[4] Univ Passau, ISL & Chair IT Secur, Passau, Germany
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II | 2017年 / 10175卷
关键词
LINE SIGNATURES; SECURE; PRIVACY;
D O I
10.1007/978-3-662-54388-7_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with the ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.
引用
收藏
页码:152 / 182
页数:31
相关论文
共 61 条
  • [1] Tag-KEM/DEM: A new framework for hybrid encryption
    Abe, Masayuki
    Gennaro, Rosario
    Kurosawa, Kaoru
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (01) : 97 - 130
  • [2] Ahn JH, 2012, LECT NOTES COMPUT SC, V7194, P1, DOI 10.1007/978-3-642-28914-9_1
  • [3] Alsouri S, 2010, LECT NOTES COMPUT SC, V6101, P63, DOI 10.1007/978-3-642-13869-0_5
  • [4] Ateniese G, 2005, LECT NOTES COMPUT SC, V3679, P159
  • [5] Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
  • [6] Ateniese G, 2004, LECT NOTES COMPUT SC, V3110, P164
  • [7] Ateniese G, 2016, REDACTABLE BLOCKCHAI, P757
  • [8] Bao F, 2011, LECT NOTES COMPUT SC, V6715, P201, DOI 10.1007/978-3-642-21554-4_12
  • [9] A Characterization of Chameleon Hash Functions and New, Efficient Designs
    Bellare, Mihir
    Ristov, Todor
    [J]. JOURNAL OF CRYPTOLOGY, 2014, 27 (04) : 799 - 823
  • [10] Cryptographically Enforced Four-Eyes Principle
    Bilzhause, Arne
    Huber, Manuel
    Poehls, Henrich C.
    Samelin, Kai
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 760 - 767