{"id":1476,"date":"2017-01-09T11:38:02","date_gmt":"2017-01-09T11:38:02","guid":{"rendered":"https:\/\/service.ait.ac.at\/prismaclone\/?p=1476"},"modified":"2017-05-23T12:18:08","modified_gmt":"2017-05-23T12:18:08","slug":"chameleon-hashes-with-ephemeral-trapdoors-and-applications-to-invisible-sanitizable-signatures","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/chameleon-hashes-with-ephemeral-trapdoors-and-applications-to-invisible-sanitizable-signatures\/","title":{"rendered":"Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures"},"content":{"rendered":"<p style=\"text-align: justify;\"><b>Title<\/b><\/p>\n<p style=\"text-align: justify;\">Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures<\/p>\n<p style=\"text-align: justify;\"><b>Authors<\/b><\/p>\n<p style=\"text-align: justify;\">Jan Camenisch (IBM Research - Zurich), David Derler (TU GRAZ), Stephan Krenn (AIT), Henrich C. P\u00f6hls (UNI PASSAU), Kai Samelin (IBM Research - Zurich), and Daniel Slamanig (TU GRAZ)<\/p>\n<p style=\"text-align: justify;\"><b>Abstract<\/b><\/p>\n<p style=\"text-align: justify;\">A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the main trapdoor is then unable to find a second pre-image of a hash value unless also provided with that ephemeral trapdoor used to compute the hash value. We present a formal security model for this new primitive as well as provably secure instantiations. The first instantiation is a generic black-box construction from any secure chameleon-hash function. We further provide three direct constructions based on standard assumptions. Our new primitive has some appealing use-cases, including a solution to the long-standing open problem of invisible sanitizable signatures, which we also present.<\/p>\n<p style=\"text-align: justify;\"><b>Venue<\/b><\/p>\n<p style=\"text-align: justify;\">20th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2017<\/p>\n<p style=\"text-align: justify;\"><b>Place and Date<\/b><\/p>\n<p style=\"text-align: justify;\">Amsterdam, The Netherlands, March 28-31, 2017<\/p>\n<p style=\"text-align: justify;\"><b>Publication Reference<\/b><\/p>\n<p style=\"text-align: justify;\">Jan Camenisch, David Derler, Stephan Krenn, Henrich C. P\u00f6hls, Kai Samelin, and Daniel Slamanig. \"Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures\". In: PKC 2017, LNCS, Springer. (to appear)<\/p>\n<p style=\"text-align: justify;\">[<a href=\"http:\/\/eprint.iacr.org\/2017\/011\">Download<\/a>]<\/p>\n<p style=\"text-align: justify;\"><b>Bibtex:<\/b><\/p>\n<pre style=\"text-align: justify;\">@inproceedings{cdkpss17,\r\n author = {Jan Camenisch\u00a0 and David Derler and Stephan Krenn and Henrich C. P\u00f6hls and Kai Samelin and Daniel Slamanig},\r\n title = {{Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures}},\r\n booktitle = {20th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2017},\r\n year = {2017},\r\n note = {(to appear)},\r\n series = {LNCS},\r\n publisher = {Springer},\r\n }<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Jan Camenisch, David Derler, Stephan Krenn, Henrich C. P\u00f6hls, Kai Samelin, and Daniel Slamanig. \"Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures\". In: PKC 2017, LNCS, Springer. (to appear)<\/p>\n","protected":false},"author":2,"featured_media":1575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1476"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=1476"}],"version-history":[{"count":5,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1476\/revisions"}],"predecessor-version":[{"id":1936,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1476\/revisions\/1936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/1575"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=1476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=1476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=1476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}