Nanchang, China        May 22 - 24, 2009

Nanchang, China        May 22 - 24, 2009

WISA 2009

WISA 2009

Second International Symposium on

Web Information Systems and Applications

Second International Symposium on

Web Information Systems and Applications

Home > Table of Contents

 

Proceedings of the 2nd International Symposium on Web Information Systems and Applications (WISA 2009)

Nanchang, China, May 22-24, 2009

Editors: Fei Yu, Jiexian Zeng, and Guangxue Yue

AP Catalog Number: AP-PROC-CS-09CN001

ISBN: 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)

Page(s): 15-18

A Secure Chameleon Hash Function without Key Exposure from Pairings

           Jianhong Zhang, Hua Chen, and Qin Geng

Full text:  PDF

Abstract

Chameleon signatures are based on well    established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest, and becomes an important building block. The  chameleon hash function is a trapdoor one-way hash  function with some special properties, and plays an    important role in constructing chameleon signature. In the paper, we propose a new chameleon hash scheme which enjoys some advantages of the previous schemes:      collision-resistant, semantic security, and key-exposure -freeness. At the same time, we show that the recipient’s trapdoor information will never be compromised under the assumption of q-SDH+CDH problem which is a new   security assumption

Index Terms

security analysis, chameleon hash function, key exposure free, the q-SDH+CDH problem

Copyright @ 2009 ACADEMY PUBLISHER — All rights reserved