• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688.
Citation: ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688.

ID-based Chameleon Hash Scheme and Signature Without Key Escrow

More Information
  • Received Date: December 09, 2009
  • Available Online: December 14, 2022
  • An identity-based chameleon hash function without the key escrow problem is proposed. It not only achieves all the desired security properties of the traditional identity-based chameleon hashing but also removes the inherent escrow problem of identity-based systems. That is, the private key generator (PKG) can not find a collision of our proposed identity-based chameleon hash function. Moreover, an identity-based chameleon signature without the key escrow problem is given by adoption of the identity-based encryption and the identitybased signature without the key escrow. Besides, a security proof of the proposed chameleon hashing and signature scheme is given, showing that these schemes without the key escrow are collision resistance, semantically securand message hiding.
  • Related Articles

    [1]CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370.
    [2]ZHOU You-sheng, XIN Yang, QING Si-han, YANG Yi-xian. Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739.
    [3]CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729.
    [4]CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235.
    [5]LIU Zhen-hua, ZHANG Xiang-song, TIAN Xu-an, HU Yu-pu. Identity-based Signature Scheme with Partial Message Recovery in the Standard Model[J]. Journal of Beijing University of Technology, 2010, 36(5): 654-658.
    [6]DING Li, ZHOU Yuan, QIAN Hai-feng. Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve[J]. Journal of Beijing University of Technology, 2010, 36(5): 646-650.
    [7]YI Xiao-lin, ZHOU Wei, LU Peng-cheng. A Blind Signature Scheme Based on Hyperelliptic Curve[J]. Journal of Beijing University of Technology, 2010, 36(2): 261-267.
    [8]CAI Yong-quan, WANG Ya-li. Conference Key Agreement Protocol Based on Elliptic Curve[J]. Journal of Beijing University of Technology, 2007, 33(8): 870-873.
    [9]CAI Mian, KANG Li. Undeniable Multiple Grade Proxy Signature Scheme[J]. Journal of Beijing University of Technology, 2006, 32(10): 953-957.
    [10]CAI Mian, SUN Xing-fang. A Secure Authorized Group Signatures[J]. Journal of Beijing University of Technology, 2006, 32(5): 431-435.

Catalog

    Article views (10) PDF downloads (8) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return