Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

被引:104
作者
Camenisch, Jan [1 ]
Derler, David [2 ]
Krenn, Stephan [3 ]
Pohls, Henrich C. [4 ]
Samelin, Kai [5 ]
Slamanig, Daniel [1 ,2 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] AIT Austrian Inst Technol GmbH, Vienna, Austria
[4] Univ Passau, ISL & Chair IT Secur, Passau, Germany
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II | 2017年 / 10175卷
关键词
LINE SIGNATURES; SECURE; PRIVACY;
D O I
10.1007/978-3-662-54388-7_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with the ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.
引用
收藏
页码:152 / 182
页数:31
相关论文
共 61 条
  • [21] Canard Sebastien, 2012, Progress in Cryptology - AFRICACRYPT 2012. Proceedings 5th International Conference on Cryptology in Africa, P35, DOI 10.1007/978-3-642-31410-0_3
  • [22] Canard S., 2013, P 8 ACM SIGSAC S INF, P381
  • [23] Canard S, 2008, LECT NOTES COMPUT SC, V5037, P258, DOI 10.1007/978-3-540-68914-0_16
  • [24] On Extended Sanitizable Signature Schemes
    Canard, Sebastien
    Jambert, Amandine
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 179 - 194
  • [25] Catalano D, 2008, LECT NOTES COMPUT SC, V4939, P101
  • [26] Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
  • [27] Chen XF, 2011, LECT NOTES COMPUT SC, V6584, P415, DOI 10.1007/978-3-642-21518-6_29
  • [28] de Meer Hermann, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P188, DOI 10.1109/ARES.2013.26
  • [29] Demirel D., 2015, TECHNICAL REPORT
  • [30] Derler D., 2016, IFIP ADV INF COMMUN, V476, P170, DOI [10.1007/978-3-319-41763-9_12, DOI 10.1007/978-3-319-41763-9_12]