Journal of South China University of Technology (Natural Science Edition) ›› 2005, Vol. 33 ›› Issue (6): 23-27.

Previous Articles     Next Articles

ID-Based Chameleon Signature Scheme from Bilinear Pairing

Du Xin-jun  Wang Ying  Ge Jian-hua  Wang Yu-min   

  1. Key Laboratory of Computer Networks and Information Security,the Ministry of Education Xidian Univ.,Xi’an 710071,Shaanxi, China
  • Received:2004-02-04 Online:2005-06-25 Published:2005-06-25
  • Contact: Du Xin-jun(born in 1974),ma1e. Ph.D.can—didate,mainly researches on wireless network safetv. E-mail:dxjwy2002@hotmail.com
  • About author:Du Xin-jun(born in 1974),ma1e. Ph.D.can—didate,mainly researches on wireless network safetv.
  • Supported by:

    Suppofled by the Project of National Communication and Security Foundation of China (J6410130)and the Key Project of National Natuml Science
    Foundation of China(69931010)

Abstract:

Chameleon signature schemes are non-interactive signature schemes based on a Hash-and-Sign para-d gm,and are s m lar in efficiency to original signature schemes. However,Chameleon signature schemes Dos-sess non-tranterability,that is to say, only the designated recipient can verify the validitv of a signature.In this papc,an ID-based Chameleon Hash function from the bilinear pairing is proposed, according to which an ID-based Chameleon signature scheme is constructed. As Compared with the conventional Chameleon Hash tunctions,the owner of a public Hash key in the ID-based Chameleon signature scheme does not need to re-trieve the assoc ated secret key.The proposed scheme possesses all the attributes of original Chameleon signa-tures.Moreover,it s of the advantages of the ID-based cryptography based on the bilinear pairing.

Key words: bilinear pairing, Chameleon Has hing, ID-based Chameleon signature