Hierarchical identity-based chameleon hash and its applications

At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify prede...

Full description

Saved in:
Bibliographic Details
Main Authors: BAO, Feng, DENG, Robert H., DING, Xuhua, LAI, Junzuo, ZHAO, Yunlei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2011
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1417
https://ink.library.smu.edu.sg/context/sis_research/article/2416/viewcontent/Bao2011_Chapter_HierarchicalIdentity_BasedCH_pv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2416
record_format dspace
spelling sg-smu-ink.sis_research-24162022-02-18T01:37:10Z Hierarchical identity-based chameleon hash and its applications BAO, Feng DENG, Robert H. DING, Xuhua LAI, Junzuo ZHAO, Yunlei At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without interacting with the original signer. In this paper, we introduce the notion of hierarchical identity-based chameleon hash (HIBCH), which is a hierarchical extension of IBCH. We show that HIBCH can be used to construct other cryptographic primitives, including hierarchical trapdoor sanitizable signature (HTSS) and key-exposure free IBCH. HTSS allows an entity who has the sanitization power for a given signed message, to further delegate its power to its descendants in a controlled manner. Finally, we propose a concrete construction of HIBCH and show that it is t-threshold collusion-resistant. 2011-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1417 info:doi/10.1007/978-3-642-21554-4_12 https://ink.library.smu.edu.sg/context/sis_research/article/2416/viewcontent/Bao2011_Chapter_HierarchicalIdentity_BasedCH_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Chameleon Hash Trapdoor Sanitizable Signature Hierarchical Identity-Based Chameleon Hash Hierarchical Trapdoor Sanitizable Signature Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Chameleon Hash
Trapdoor Sanitizable Signature
Hierarchical Identity-Based Chameleon Hash
Hierarchical Trapdoor Sanitizable Signature
Information Security
spellingShingle Chameleon Hash
Trapdoor Sanitizable Signature
Hierarchical Identity-Based Chameleon Hash
Hierarchical Trapdoor Sanitizable Signature
Information Security
BAO, Feng
DENG, Robert H.
DING, Xuhua
LAI, Junzuo
ZHAO, Yunlei
Hierarchical identity-based chameleon hash and its applications
description At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without interacting with the original signer. In this paper, we introduce the notion of hierarchical identity-based chameleon hash (HIBCH), which is a hierarchical extension of IBCH. We show that HIBCH can be used to construct other cryptographic primitives, including hierarchical trapdoor sanitizable signature (HTSS) and key-exposure free IBCH. HTSS allows an entity who has the sanitization power for a given signed message, to further delegate its power to its descendants in a controlled manner. Finally, we propose a concrete construction of HIBCH and show that it is t-threshold collusion-resistant.
format text
author BAO, Feng
DENG, Robert H.
DING, Xuhua
LAI, Junzuo
ZHAO, Yunlei
author_facet BAO, Feng
DENG, Robert H.
DING, Xuhua
LAI, Junzuo
ZHAO, Yunlei
author_sort BAO, Feng
title Hierarchical identity-based chameleon hash and its applications
title_short Hierarchical identity-based chameleon hash and its applications
title_full Hierarchical identity-based chameleon hash and its applications
title_fullStr Hierarchical identity-based chameleon hash and its applications
title_full_unstemmed Hierarchical identity-based chameleon hash and its applications
title_sort hierarchical identity-based chameleon hash and its applications
publisher Institutional Knowledge at Singapore Management University
publishDate 2011
url https://ink.library.smu.edu.sg/sis_research/1417
https://ink.library.smu.edu.sg/context/sis_research/article/2416/viewcontent/Bao2011_Chapter_HierarchicalIdentity_BasedCH_pv.pdf
_version_ 1770571114578182144