Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications

被引:1
|
作者
Liu, Xiangyu [1 ,2 ]
Liu, Shengli [1 ,2 ,3 ]
Gu, Dawu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Chameleon hash functions; Tight security; Multi-user setting; Signatures; SIGNATURES; EFFICIENT;
D O I
10.1007/978-3-030-55304-3_36
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We define the security notion of strong collision resistance for chameleon hash functions in the multi-user setting (S-MU-CR security). We also present three specific constructions CHFdl, CHFrsa and CHFfac of chameleon hash functions, and prove their tight S-MU-CR security based on the discrete logarithm, RSA and factoring assumptions, respectively. In applications, we show that tightly S-MU-CR secure chameleon hash functions can lift a signature scheme from (weak) unforgeability to strong unforgeability with a tight security reduction in the multi-user setting.
引用
收藏
页码:664 / 673
页数:10
相关论文
共 50 条
  • [41] A Multi-User Collaborative Access Control Scheme Based on New Hash Chain
    Wang, Zetian
    Li, Yunfa
    Liu, Guanxu
    Zhang, Di
    ELECTRONICS, 2023, 12 (08)
  • [42] Hash-Function Based PRFs: AMAC and Its Multi-User Security
    Bellare, Mihir
    Bernstein, Daniel J.
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 566 - 595
  • [43] Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications
    Upadhyay, Darshana
    Gaikwad, Nupur
    Zaman, Marzia
    Sampalli, Srinivas
    IEEE ACCESS, 2022, 10 : 112472 - 112486
  • [44] Secure Probabilistic Caching for Stochastic Multi-User Multi-Relay Networks
    Fan, Lisheng
    Lei, Xianfu
    Zhao, Nan
    Fan, Pingzhi
    Karagiannidis, George K.
    2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,
  • [45] Secure Beamforming in Multi-User Multi-IRS Millimeter Wave Systems
    Rafieifar, Anahid
    Ahmadinejad, Hosein
    Razavizadeh, S. Mohammad
    He, Jiguang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (09) : 6140 - 6156
  • [46] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62
  • [47] Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages
    Xu, Dongyang
    Ren, Pinyi
    Du, Qinghe
    Sun, Li
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 644 - 653
  • [48] On the security of verifiably encrypted signature schemes in a multi-user setting
    Shim, Kyung-Ah
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (11-12) : 585 - 591
  • [49] Fine-grained searchable encryption in multi-user setting
    Jun Ye
    Jianfeng Wang
    Jiaolian Zhao
    Jian Shen
    Kuan-Ching Li
    Soft Computing, 2017, 21 : 6201 - 6212
  • [50] Server-aided searchable encryption in multi-user setting
    Sun, Lixue
    Xu, Chunxiang
    Li, Chuang
    Li, Yuhui
    COMPUTER COMMUNICATIONS, 2020, 164 (164) : 25 - 30