Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications

被引:1
|
作者
Liu, Xiangyu [1 ,2 ]
Liu, Shengli [1 ,2 ,3 ]
Gu, Dawu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Chameleon hash functions; Tight security; Multi-user setting; Signatures; SIGNATURES; EFFICIENT;
D O I
10.1007/978-3-030-55304-3_36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We define the security notion of strong collision resistance for chameleon hash functions in the multi-user setting (S-MU-CR security). We also present three specific constructions CHFdl, CHFrsa and CHFfac of chameleon hash functions, and prove their tight S-MU-CR security based on the discrete logarithm, RSA and factoring assumptions, respectively. In applications, we show that tightly S-MU-CR secure chameleon hash functions can lift a signature scheme from (weak) unforgeability to strong unforgeability with a tight security reduction in the multi-user setting.
引用
收藏
页码:664 / 673
页数:10
相关论文
共 50 条
  • [1] A generic construction of tightly secure signatures in the multi-user setting
    Zhang, Xiao
    Liu, Shengli
    Gu, Dawu
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2019, 775 : 32 - 52
  • [2] Tightly-Secure Signatures from Chameleon Hash Functions
    Blazy, Olivier
    Kakvi, Saqib A.
    Kiltz, Eike
    Pan, Jiaxin
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
  • [3] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Lee, Youngkyung
    Lee, Dong Hoon
    Park, Jong Hwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (11) : 2433 - 2452
  • [4] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Youngkyung Lee
    Dong Hoon Lee
    Jong Hwan Park
    Designs, Codes and Cryptography, 2020, 88 : 2433 - 2452
  • [5] Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency
    Wei, Puwen
    Wang, Wei
    Zhu, Bingxin
    Yiu, Siu Ming
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 3 - 22
  • [6] Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
    Wang, Yong
    Ismail, Eddie Shahril
    MATHEMATICS, 2024, 12 (15)
  • [7] Information-Theoretically Secure Entity Authentication in the Multi-user Setting
    Hajime, Shogo
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
  • [8] Secure Multi-User Content Sharing for Augmented Reality Applications
    Ruth, Kimberly
    Kohno, Tadayoshi
    Roesner, Franziska
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 141 - 158
  • [9] Secure and efficient encrypted keyword search for multi-user setting in cloud computing
    Haijiang Wang
    Xiaolei Dong
    Zhenfu Cao
    Peer-to-Peer Networking and Applications, 2019, 12 : 32 - 42
  • [10] Secure and efficient encrypted keyword search for multi-user setting in cloud computing
    Wang, Haijiang
    Dong, Xiaolei
    Cao, Zhenfu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 32 - 42