A Characterization of Chameleon Hash Functions and New, Efficient Designs

Mihir Bellare, Todor Ristov

Journal of Cryptology(2013)

引用 25|浏览41
暂无评分
摘要
This paper shows that chameleon hash functions and Sigma protocols are equivalent. We provide a transform of any suitable Sigma protocol to a chameleon hash function, and also show that any chameleon hash function is the result of applying our transform to some suitable Sigma protocol. This enables us to unify previous designs of chameleon hash functions, seeing them all as emanating from a common paradigm, and also obtain new designs that are more efficient than previous ones. In particular, via a modified version of the Fiat–Shamir protocol, we obtain the fastest known chameleon hash function with a proof of security based on the standard factoring assumption. The increasing number of applications of chameleon hash functions, including on-line/off-line signing, chameleon signatures, designated-verifier signatures and conversion from weakly-secure to fully-secure signatures, make our work of contemporary interest.
更多
查看译文
关键词
Hash functions,Collision-resistance,Chameleon hash functions,Fiat-Shamir paradigm,Sigma protocols,Identification schemes,VSH,GQ,Schnorr
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要