Hierarchical identity-based chameleon hash and its applications
At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify prede...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1417 https://ink.library.smu.edu.sg/context/sis_research/article/2416/viewcontent/Bao2011_Chapter_HierarchicalIdentity_BasedCH_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2416 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-24162022-02-18T01:37:10Z Hierarchical identity-based chameleon hash and its applications BAO, Feng DENG, Robert H. DING, Xuhua LAI, Junzuo ZHAO, Yunlei At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without interacting with the original signer. In this paper, we introduce the notion of hierarchical identity-based chameleon hash (HIBCH), which is a hierarchical extension of IBCH. We show that HIBCH can be used to construct other cryptographic primitives, including hierarchical trapdoor sanitizable signature (HTSS) and key-exposure free IBCH. HTSS allows an entity who has the sanitization power for a given signed message, to further delegate its power to its descendants in a controlled manner. Finally, we propose a concrete construction of HIBCH and show that it is t-threshold collusion-resistant. 2011-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1417 info:doi/10.1007/978-3-642-21554-4_12 https://ink.library.smu.edu.sg/context/sis_research/article/2416/viewcontent/Bao2011_Chapter_HierarchicalIdentity_BasedCH_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Chameleon Hash Trapdoor Sanitizable Signature Hierarchical Identity-Based Chameleon Hash Hierarchical Trapdoor Sanitizable Signature Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Chameleon Hash Trapdoor Sanitizable Signature Hierarchical Identity-Based Chameleon Hash Hierarchical Trapdoor Sanitizable Signature Information Security |
spellingShingle |
Chameleon Hash Trapdoor Sanitizable Signature Hierarchical Identity-Based Chameleon Hash Hierarchical Trapdoor Sanitizable Signature Information Security BAO, Feng DENG, Robert H. DING, Xuhua LAI, Junzuo ZHAO, Yunlei Hierarchical identity-based chameleon hash and its applications |
description |
At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without interacting with the original signer. In this paper, we introduce the notion of hierarchical identity-based chameleon hash (HIBCH), which is a hierarchical extension of IBCH. We show that HIBCH can be used to construct other cryptographic primitives, including hierarchical trapdoor sanitizable signature (HTSS) and key-exposure free IBCH. HTSS allows an entity who has the sanitization power for a given signed message, to further delegate its power to its descendants in a controlled manner. Finally, we propose a concrete construction of HIBCH and show that it is t-threshold collusion-resistant. |
format |
text |
author |
BAO, Feng DENG, Robert H. DING, Xuhua LAI, Junzuo ZHAO, Yunlei |
author_facet |
BAO, Feng DENG, Robert H. DING, Xuhua LAI, Junzuo ZHAO, Yunlei |
author_sort |
BAO, Feng |
title |
Hierarchical identity-based chameleon hash and its applications |
title_short |
Hierarchical identity-based chameleon hash and its applications |
title_full |
Hierarchical identity-based chameleon hash and its applications |
title_fullStr |
Hierarchical identity-based chameleon hash and its applications |
title_full_unstemmed |
Hierarchical identity-based chameleon hash and its applications |
title_sort |
hierarchical identity-based chameleon hash and its applications |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/1417 https://ink.library.smu.edu.sg/context/sis_research/article/2416/viewcontent/Bao2011_Chapter_HierarchicalIdentity_BasedCH_pv.pdf |
_version_ |
1770571114578182144 |