Revocable policy-based Chameleon hash
Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the un...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6741 https://ink.library.smu.edu.sg/context/sis_research/article/7744/viewcontent/510630_1_En_Print.indd.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-7744 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-77442023-08-10T05:42:55Z Revocable policy-based Chameleon hash XU, Shengmin NING, Jianting MA, Jinhua XU, Guowen YUAN, Jiaming DENG, Robert H. Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the underlying message without affecting the hash value. In practice, it is necessary to revoke the rewriting privileges of a trapdoor holder due to various reasons, such as change of positions, compromise of credentials, or malicious behaviours. In this paper, we introduce the notion of revocable PCH (RPCH) and formally define its security. We instantiate a concrete RPCH construction by putting forward a practical revocable attribute-based encryption (RABE) scheme which is adaptively secure under a standard assumption on prime-order pairing groups. As application examples, we show how to effectively integrate RPCH into mutable blockchain and sanitizable signature for revoking the rewriting privileges of any chameleon trapdoor holders. We implement our RPCH scheme and evaluate its performance to demonstrate its efficiency. 2021-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6741 info:doi/10.1007/978-3-030-88418-5_16 https://ink.library.smu.edu.sg/context/sis_research/article/7744/viewcontent/510630_1_En_Print.indd.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Policy-based chameleon hash Revocable attribute-based encryption Mutable blockchain Sanitizable signature Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Policy-based chameleon hash Revocable attribute-based encryption Mutable blockchain Sanitizable signature Information Security |
spellingShingle |
Policy-based chameleon hash Revocable attribute-based encryption Mutable blockchain Sanitizable signature Information Security XU, Shengmin NING, Jianting MA, Jinhua XU, Guowen YUAN, Jiaming DENG, Robert H. Revocable policy-based Chameleon hash |
description |
Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the underlying message without affecting the hash value. In practice, it is necessary to revoke the rewriting privileges of a trapdoor holder due to various reasons, such as change of positions, compromise of credentials, or malicious behaviours. In this paper, we introduce the notion of revocable PCH (RPCH) and formally define its security. We instantiate a concrete RPCH construction by putting forward a practical revocable attribute-based encryption (RABE) scheme which is adaptively secure under a standard assumption on prime-order pairing groups. As application examples, we show how to effectively integrate RPCH into mutable blockchain and sanitizable signature for revoking the rewriting privileges of any chameleon trapdoor holders. We implement our RPCH scheme and evaluate its performance to demonstrate its efficiency. |
format |
text |
author |
XU, Shengmin NING, Jianting MA, Jinhua XU, Guowen YUAN, Jiaming DENG, Robert H. |
author_facet |
XU, Shengmin NING, Jianting MA, Jinhua XU, Guowen YUAN, Jiaming DENG, Robert H. |
author_sort |
XU, Shengmin |
title |
Revocable policy-based Chameleon hash |
title_short |
Revocable policy-based Chameleon hash |
title_full |
Revocable policy-based Chameleon hash |
title_fullStr |
Revocable policy-based Chameleon hash |
title_full_unstemmed |
Revocable policy-based Chameleon hash |
title_sort |
revocable policy-based chameleon hash |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2021 |
url |
https://ink.library.smu.edu.sg/sis_research/6741 https://ink.library.smu.edu.sg/context/sis_research/article/7744/viewcontent/510630_1_En_Print.indd.pdf |
_version_ |
1779156842557997056 |