A Hash-Based Quantum-Resistant Chameleon Signature Scheme
As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enabl...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-12-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/24/8417 |
_version_ | 1797500776055046144 |
---|---|
author | P. Thanalakshmi R. Anitha N. Anbazhagan Woong Cho Gyanendra Prasad Joshi Eunmok Yang |
author_facet | P. Thanalakshmi R. Anitha N. Anbazhagan Woong Cho Gyanendra Prasad Joshi Eunmok Yang |
author_sort | P. Thanalakshmi |
collection | DOAJ |
description | As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enables the trapdoor information holder to compute a message digest collision. The holder of a chameleon signature is the recipient of a chameleon signature. He could compute collision on the hash value using the trapdoor information. This keeps the recipient from disclosing his conviction to a third party and ensures the privacy of the signature. The majority of the extant chameleon signature methods are built on the computationally infeasible number theory problems, like integer factorization and discrete log. Unfortunately, the construction of quantum computers would be rendered insecure to those schemes. This creates a solid requirement for construct chameleon signatures for the quantum world. Hence, this paper proposes a novel quantum secure chameleon signature scheme based on hash functions. As a hash-based cryptosystem is an essential candidate of a post-quantum cryptosystem, the proposed hash-based chameleon signature scheme would be a promising alternative to the number of theoretic-based methods. Furthermore, the proposed method is key exposure-free and satisfies the security requirements such as semantic security, non-transferability, and unforgeability. |
first_indexed | 2024-03-10T03:08:42Z |
format | Article |
id | doaj.art-676b63a769cb4bdda7fcf64c371f67a6 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T03:08:42Z |
publishDate | 2021-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-676b63a769cb4bdda7fcf64c371f67a62023-11-23T10:31:10ZengMDPI AGSensors1424-82202021-12-012124841710.3390/s21248417A Hash-Based Quantum-Resistant Chameleon Signature SchemeP. Thanalakshmi0R. Anitha1N. Anbazhagan2Woong Cho3Gyanendra Prasad Joshi4Eunmok Yang5Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore 641004, IndiaDepartment of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore 641004, IndiaDepartment of Mathematics, Alagappa University, Karaikudi 630004, IndiaDepartment of Software Convergence, Daegu Catholic University, Gyeongsan 38430, KoreaDepartment of Computer Science and Engineering, Sejong University, Seoul 05006, KoreaDepartment of Information Security, Cryptology and Mathematics, Kookmin University, Seoul 02707, KoreaAs a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enables the trapdoor information holder to compute a message digest collision. The holder of a chameleon signature is the recipient of a chameleon signature. He could compute collision on the hash value using the trapdoor information. This keeps the recipient from disclosing his conviction to a third party and ensures the privacy of the signature. The majority of the extant chameleon signature methods are built on the computationally infeasible number theory problems, like integer factorization and discrete log. Unfortunately, the construction of quantum computers would be rendered insecure to those schemes. This creates a solid requirement for construct chameleon signatures for the quantum world. Hence, this paper proposes a novel quantum secure chameleon signature scheme based on hash functions. As a hash-based cryptosystem is an essential candidate of a post-quantum cryptosystem, the proposed hash-based chameleon signature scheme would be a promising alternative to the number of theoretic-based methods. Furthermore, the proposed method is key exposure-free and satisfies the security requirements such as semantic security, non-transferability, and unforgeability.https://www.mdpi.com/1424-8220/21/24/8417digital signaturechameleon signaturehash-based cryptographyhomomorphic hash functionPreimage Resistancekey exposure free |
spellingShingle | P. Thanalakshmi R. Anitha N. Anbazhagan Woong Cho Gyanendra Prasad Joshi Eunmok Yang A Hash-Based Quantum-Resistant Chameleon Signature Scheme Sensors digital signature chameleon signature hash-based cryptography homomorphic hash function Preimage Resistance key exposure free |
title | A Hash-Based Quantum-Resistant Chameleon Signature Scheme |
title_full | A Hash-Based Quantum-Resistant Chameleon Signature Scheme |
title_fullStr | A Hash-Based Quantum-Resistant Chameleon Signature Scheme |
title_full_unstemmed | A Hash-Based Quantum-Resistant Chameleon Signature Scheme |
title_short | A Hash-Based Quantum-Resistant Chameleon Signature Scheme |
title_sort | hash based quantum resistant chameleon signature scheme |
topic | digital signature chameleon signature hash-based cryptography homomorphic hash function Preimage Resistance key exposure free |
url | https://www.mdpi.com/1424-8220/21/24/8417 |
work_keys_str_mv | AT pthanalakshmi ahashbasedquantumresistantchameleonsignaturescheme AT ranitha ahashbasedquantumresistantchameleonsignaturescheme AT nanbazhagan ahashbasedquantumresistantchameleonsignaturescheme AT woongcho ahashbasedquantumresistantchameleonsignaturescheme AT gyanendraprasadjoshi ahashbasedquantumresistantchameleonsignaturescheme AT eunmokyang ahashbasedquantumresistantchameleonsignaturescheme AT pthanalakshmi hashbasedquantumresistantchameleonsignaturescheme AT ranitha hashbasedquantumresistantchameleonsignaturescheme AT nanbazhagan hashbasedquantumresistantchameleonsignaturescheme AT woongcho hashbasedquantumresistantchameleonsignaturescheme AT gyanendraprasadjoshi hashbasedquantumresistantchameleonsignaturescheme AT eunmokyang hashbasedquantumresistantchameleonsignaturescheme |