Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

被引:104
作者
Camenisch, Jan [1 ]
Derler, David [2 ]
Krenn, Stephan [3 ]
Pohls, Henrich C. [4 ]
Samelin, Kai [5 ]
Slamanig, Daniel [1 ,2 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] AIT Austrian Inst Technol GmbH, Vienna, Austria
[4] Univ Passau, ISL & Chair IT Secur, Passau, Germany
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II | 2017年 / 10175卷
关键词
LINE SIGNATURES; SECURE; PRIVACY;
D O I
10.1007/978-3-662-54388-7_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with the ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.
引用
收藏
页码:152 / 182
页数:31
相关论文
共 61 条
  • [11] Tightly-Secure Signatures from Chameleon Hash Functions
    Blazy, Olivier
    Kakvi, Saqib A.
    Kiltz, Eike
    Pan, Jiaxin
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
  • [12] MINIMUM DISCLOSURE PROOFS OF KNOWLEDGE
    BRASSARD, G
    CHAUM, D
    CREPEAU, C
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1988, 37 (02) : 156 - 189
  • [13] Bresson E, 2007, LECT NOTES COMPUT SC, V4450, P217
  • [14] Brzuska Christina, 2014, Public Key Infrastructures, Services and Applications. 10th European Workshop, EuroPKI 2013, Revised Selected Papers: LNCS 8341, P12, DOI 10.1007/978-3-642-53997-8_2
  • [15] Brzuska Christina, 2013, Public Key Infrastructures, Services and Applications. 9th European Workshop, EuroPKI 2012. Revised Selected Papers: LNCS 7868, P178, DOI 10.1007/978-3-642-40012-4_12
  • [16] Brzuska C., 2009, LNI, P117
  • [17] Brzuska C, 2010, LECT NOTES COMPUT SC, V6123, P87, DOI 10.1007/978-3-642-13708-2_6
  • [18] Brzuska C, 2010, LECT NOTES COMPUT SC, V6056, P444
  • [19] Brzuska C, 2009, LECT NOTES COMPUT SC, V5443, P317
  • [20] Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410