Published July 2024
| Version v1
Publication
Open
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting
Creators
Description
Pages 1066 - 1081
ABSTRACT
Chameleon hash (CH) function differs from a classical hash function in a way that a collision can be found with the knowledge of a trapdoor secret key. CH schemes have been used in various cryptographic applications such as sanitizable signatures and redactable blockchains. In this work, we reconstruct CH to ensure advanced security and usability. Our contributions are four-fold. First, we propose the first CH scheme, which supports full security, meaning the inclusion of both full indistinguishability and full collision-resistance. These two properties are required in the strongest CH security model in the literature. We achieve this by our innovative design of removing the CH public key during the computation of the hash value. Second, we investigate the security of CH in the multi-party setting and introduce the new properties of claimability and deniability under this setting. Third, we present and implement two instantiations of our CH scheme: an ECC-based one and a post-quantum lattice-based one. Our implementation demonstrates their practicality. Finally, we discuss the possible use cases in the blockchain.
AUTHORS
Kwan Yin Chan
kychan@cs.hku.hk
The University of Hong Kong
Pokfulam, Hong Kong
Liqun Chen
liqun.chen@surrey.ac.uk
University of Surrey
Guildford, United Kingdom
Yangguang Tian
yangguang.tian@surrey.ac.uk
University of Surrey
Guildford, United Kingdom
Tsz Hon Yuen∗
john.tszhonyuen@monash.edu
Monash University
Clayton, Australia
Files
Reconstructing Chameleon Hash _ Full Security and the Multi-Party Setting.pdf
Files
(882.8 kB)
Name | Size | Download all |
---|---|---|
md5:524556ae70e0ac0ba5ac2a9abf4e5047
|
882.8 kB | Preview Download |