A Quantum Resistant Chameleon Hashing and Signature Scheme

被引:2
|
作者
Thanalakshmi, P. [1 ]
Anitha, R. [1 ]
机构
[1] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore 641004, Tamil Nadu, India
关键词
CFS signature; Chameleon hashing; Chameleon signatures; Code-based cryptography; Collision-resistance; Digital signatures; LATTICE SIGNATURES;
D O I
10.1080/03772063.2019.1698323
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Chameleon signatures introduced by Krawczyk and Rabin are based on well-established hash-and-sign paradigm. It is a non-interactive signature scheme that simultaneously provides the properties of non-transferability and non-repudiation. The chameleon hash function is a trapdoor one-way function which prevents everyone except the holder of the trapdoor information from computing collision on a message digest. The chameleon signature scheme achieves non-transferability as the recipient of the signature is the holder of the trapdoor information. He could be able to compute collision on the hash value and hence no third party could be able to identify the real signer. In the initial constructions of chameleon signature schemes, the occurrences of collisions expose the secret key of the recipient. This strongly prevents the recipient to compute hash collisions, partially undermining the concept of non-transferability. Hence it is important to overcome this key exposure problem, and its aligned problems of key revocation and key redistribution. Also the existing chameleon signature schemes are based on the hard problems in number theory such as integer factorization or the discrete log problem over various groups. The construction of a large-scale quantum computer would render insecurity to these schemes. Hence as recommended by NISTIR 8105, we propose a quantum resistant chameleon hashing and signature scheme based on hard problems in coding theory. The scheme also satisfies the security properties of chameleon signature, such as collision resistance, semantic security, key exposure freeness, non-transferability and unforgeability. As code-based cryptosystem is an important candidate of postquantum cryptosystem, the proposed code-based chameleon signature scheme would be a promising alternative to the number theoretic based schemes. In addition, we also propose a method to transform the code-based chameleon hashing scheme into an ordinary signature scheme and prove its unforgeability in the random oracle model.
引用
收藏
页码:2271 / 2282
页数:12
相关论文
共 50 条
  • [1] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)
  • [2] A Quantum Resistant Anonymous Poxy Signature Scheme
    Rawal, Swati
    Padhye, Sahadeo
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2022, 47 (01):
  • [3] A Quantum Resistant Anonymous Poxy Signature Scheme
    SWATI RAWAL
    SAHADEO PADHYE
    Sādhanā, 2022, 47
  • [4] CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
    Kabil, Ahmad
    Aslan, Heba
    Azer, Marianne A.
    Rasslan, Mohamed
    CRYPTOGRAPHY, 2024, 8 (03)
  • [5] A Graph-Based Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 327 - 335
  • [6] An Attack-Resistant Hashing Scheme
    Peng, Tao
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    2007 AUSTRALASIANTELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE, 2007, : 484 - 487
  • [7] Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
    Yoon, Eun-Jun
    Khan, Muhammad Khurram
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (12) : 3400 - 3402
  • [8] Enhance IoT Security: A Blockchain and Chameleon Hashing-Based Scheme for Authentication
    Zeng, Zixuan
    Xu, Zhou
    Luo, Bin
    Jiang, Yi
    Xiong, Anping
    FRONTIERS IN CYBER SECURITY, FCS 2024, PT II, 2024, 2316 : 237 - 254
  • [9] On quantum (delta, N")-resistant hashing
    Ablayev, M.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2016, 37 (06) : 758 - 767
  • [10] A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
    Wang, Hongji
    Yao, Gang
    Wang, Beizhan
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2020, : 125 - 129