You are looking at a specific version 20040315:231840 of this paper. See the latest version.

Paper 2003/167

Identity-based Chameleon Hash and Applications

Giuseppe Ateniese and Breno de Medeiros

Abstract

Chameleon signatures are non-interactive signatures based on a hash-and-sign para\-digm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advantages of identity-based cryptography over conventional schemes relative to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need to retrieve the associated secret key. We use the identity-based chameleon hashing scheme to build the id-based chameleon signature and a novel sealed-bid auction scheme that is robust, communication efficient (bidders send a single message), and secure under a particular trust model.

Note: Incorporated FC'04 anonymous referees' comments.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. In Financial Cryptography 2004 (FC'04)
Keywords
Digital signaturessecure hash functionschameleon hashingsealed-bid auctions.
Contact author(s)
ateniese @ cs jhu edu
History
2004-03-15: last of 3 revisions
2003-08-15: received
See all versions
Short URL
https://ia.cr/2003/167
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.