Paper 2003/167
Identity-based Chameleon Hash and Applications
Giuseppe Ateniese and Breno de Medeiros
Abstract
Chameleon signatures are non-interactive signatures based on a hash-and-sign para\-digm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.
Note: Incorporated FC'04 anonymous referees' comments.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. In Financial Cryptography 2004 (FC'04)
- Keywords
- Digital signaturessecure hash functionschameleon hashingsealed-bid auctions.
- Contact author(s)
- ateniese @ cs jhu edu
- History
- 2004-03-15: last of 3 revisions
- 2003-08-15: received
- See all versions
- Short URL
- https://ia.cr/2003/167
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2003/167, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {Identity-based Chameleon Hash and Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2003/167}, year = {2003}, url = {https://eprint.iacr.org/2003/167} }