Revocable policy-based Chameleon hash

Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the un...

Full description

Saved in:
Bibliographic Details
Main Authors: XU, Shengmin, NING, Jianting, MA, Jinhua, XU, Guowen, YUAN, Jiaming, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2021
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/6741
https://ink.library.smu.edu.sg/context/sis_research/article/7744/viewcontent/510630_1_En_Print.indd.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7744
record_format dspace
spelling sg-smu-ink.sis_research-77442023-08-10T05:42:55Z Revocable policy-based Chameleon hash XU, Shengmin NING, Jianting MA, Jinhua XU, Guowen YUAN, Jiaming DENG, Robert H. Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the underlying message without affecting the hash value. In practice, it is necessary to revoke the rewriting privileges of a trapdoor holder due to various reasons, such as change of positions, compromise of credentials, or malicious behaviours. In this paper, we introduce the notion of revocable PCH (RPCH) and formally define its security. We instantiate a concrete RPCH construction by putting forward a practical revocable attribute-based encryption (RABE) scheme which is adaptively secure under a standard assumption on prime-order pairing groups. As application examples, we show how to effectively integrate RPCH into mutable blockchain and sanitizable signature for revoking the rewriting privileges of any chameleon trapdoor holders. We implement our RPCH scheme and evaluate its performance to demonstrate its efficiency. 2021-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6741 info:doi/10.1007/978-3-030-88418-5_16 https://ink.library.smu.edu.sg/context/sis_research/article/7744/viewcontent/510630_1_En_Print.indd.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Policy-based chameleon hash Revocable attribute-based encryption Mutable blockchain Sanitizable signature Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Policy-based chameleon hash
Revocable attribute-based encryption
Mutable blockchain
Sanitizable signature
Information Security
spellingShingle Policy-based chameleon hash
Revocable attribute-based encryption
Mutable blockchain
Sanitizable signature
Information Security
XU, Shengmin
NING, Jianting
MA, Jinhua
XU, Guowen
YUAN, Jiaming
DENG, Robert H.
Revocable policy-based Chameleon hash
description Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the underlying message without affecting the hash value. In practice, it is necessary to revoke the rewriting privileges of a trapdoor holder due to various reasons, such as change of positions, compromise of credentials, or malicious behaviours. In this paper, we introduce the notion of revocable PCH (RPCH) and formally define its security. We instantiate a concrete RPCH construction by putting forward a practical revocable attribute-based encryption (RABE) scheme which is adaptively secure under a standard assumption on prime-order pairing groups. As application examples, we show how to effectively integrate RPCH into mutable blockchain and sanitizable signature for revoking the rewriting privileges of any chameleon trapdoor holders. We implement our RPCH scheme and evaluate its performance to demonstrate its efficiency.
format text
author XU, Shengmin
NING, Jianting
MA, Jinhua
XU, Guowen
YUAN, Jiaming
DENG, Robert H.
author_facet XU, Shengmin
NING, Jianting
MA, Jinhua
XU, Guowen
YUAN, Jiaming
DENG, Robert H.
author_sort XU, Shengmin
title Revocable policy-based Chameleon hash
title_short Revocable policy-based Chameleon hash
title_full Revocable policy-based Chameleon hash
title_fullStr Revocable policy-based Chameleon hash
title_full_unstemmed Revocable policy-based Chameleon hash
title_sort revocable policy-based chameleon hash
publisher Institutional Knowledge at Singapore Management University
publishDate 2021
url https://ink.library.smu.edu.sg/sis_research/6741
https://ink.library.smu.edu.sg/context/sis_research/article/7744/viewcontent/510630_1_En_Print.indd.pdf
_version_ 1779156842557997056