Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

被引:104
作者
Camenisch, Jan [1 ]
Derler, David [2 ]
Krenn, Stephan [3 ]
Pohls, Henrich C. [4 ]
Samelin, Kai [5 ]
Slamanig, Daniel [1 ,2 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] AIT Austrian Inst Technol GmbH, Vienna, Austria
[4] Univ Passau, ISL & Chair IT Secur, Passau, Germany
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II | 2017年 / 10175卷
关键词
LINE SIGNATURES; SECURE; PRIVACY;
D O I
10.1007/978-3-662-54388-7_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with the ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.
引用
收藏
页码:152 / 182
页数:31
相关论文
共 61 条
  • [31] Blank Digital Signatures: Optimization and Practical Experiences
    Derler, David
    Hanser, Christian
    Slamanig, Daniel
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR THE FUTURE INTERNET IN THE AGE OF GLOBALISATION, 2015, 457 : 201 - 215
  • [32] Rethinking Privacy for Extended Sanitizable Signatures and a Black- Box Construction of Strongly Private Schemes
    Derler, David
    Slamanig, Daniel
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 455 - 474
  • [33] Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
  • [34] Fehr V., 2015, IACR CRYPTOLOGY EPRI, V2015, P765
  • [35] Fischlin M, 2001, THESIS
  • [36] Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys
    Fleischhacker, Nils
    Krupp, Johannes
    Malavolta, Giulio
    Schneider, Jonas
    Schroeder, Dominique
    Simkin, Mark
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 301 - 330
  • [37] Chameleon hashes without key exposure based on factoring
    Gao, Wei
    Wang, Xue-Li
    Xie, Dong-Qing
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 109 - 113
  • [38] Chameleon hash without key exposure based on Schnorr signature
    Gao, Wei
    Li, Fei
    Wang, Xueli
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 282 - 285
  • [39] Ghosh Esha, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P149, DOI 10.1007/978-3-319-28166-7_8
  • [40] Ghosh Esha., 2015, IACR Cryptology ePrint Archive, V2015, P283