Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

被引:113
作者
Camenisch, Jan [1 ]
Derler, David [2 ]
Krenn, Stephan [3 ]
Pohls, Henrich C. [4 ]
Samelin, Kai [5 ]
Slamanig, Daniel [1 ,2 ]
机构
[1] IBM Res Zurich, Ruschlikon, Switzerland
[2] Graz Univ Technol, IAIK, Graz, Austria
[3] AIT Austrian Inst Technol GmbH, Vienna, Austria
[4] Univ Passau, ISL & Chair IT Secur, Passau, Germany
[5] Tech Univ Darmstadt, Darmstadt, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II | 2017年 / 10175卷
关键词
LINE SIGNATURES; SECURE; PRIVACY;
D O I
10.1007/978-3-662-54388-7_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with the ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.
引用
收藏
页码:152 / 182
页数:31
相关论文
共 61 条
[31]   Blank Digital Signatures: Optimization and Practical Experiences [J].
Derler, David ;
Hanser, Christian ;
Slamanig, Daniel .
PRIVACY AND IDENTITY MANAGEMENT FOR THE FUTURE INTERNET IN THE AGE OF GLOBALISATION, 2015, 457 :201-215
[32]   Rethinking Privacy for Extended Sanitizable Signatures and a Black- Box Construction of Strongly Private Schemes [J].
Derler, David ;
Slamanig, Daniel .
PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 :455-474
[33]  
Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
[34]  
Fehr V., 2015, IACR CRYPTOLOGY EPRI, V2015, P765
[35]  
Fischlin M, 2001, THESIS
[36]   Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys [J].
Fleischhacker, Nils ;
Krupp, Johannes ;
Malavolta, Giulio ;
Schneider, Jonas ;
Schroeder, Dominique ;
Simkin, Mark .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 :301-330
[37]   Chameleon hashes without key exposure based on factoring [J].
Gao, Wei ;
Wang, Xue-Li ;
Xie, Dong-Qing .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) :109-113
[38]   Chameleon hash without key exposure based on Schnorr signature [J].
Gao, Wei ;
Li, Fei ;
Wang, Xueli .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :282-285
[39]  
Ghosh Esha, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P149, DOI 10.1007/978-3-319-28166-7_8
[40]  
Ghosh Esha., 2015, IACR Cryptology ePrint Archive, V2015, P283