WO2023163654A3 - Computer-implemented method, computer program and computer-readable medium using a chameleon hash function - Google Patents
Computer-implemented method, computer program and computer-readable medium using a chameleon hash function Download PDFInfo
- Publication number
- WO2023163654A3 WO2023163654A3 PCT/SG2023/050094 SG2023050094W WO2023163654A3 WO 2023163654 A3 WO2023163654 A3 WO 2023163654A3 SG 2023050094 W SG2023050094 W SG 2023050094W WO 2023163654 A3 WO2023163654 A3 WO 2023163654A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- hash function
- chameleon hash
- implemented method
- readable medium
- Prior art date
Links
- 241000122205 Chamaeleonidae Species 0.000 title abstract 5
- 238000000034 method Methods 0.000 title abstract 3
- 238000004590 computer program Methods 0.000 title 1
- 238000012795 verification Methods 0.000 abstract 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
In some aspects, a computer-implemented method using a chameleon hash function is provided. The chameleon hash function includes one or more modular exponentiations and one or more modular multiplications. The method includes, at a signature-verification phase: precomputing, at an offline phase of the signature-verification phase, at least partially each of the one or more modular exponentiations of the chameleon hash function; and evaluating, at an online phase of the signature-verification phase, the chameleon hash function based on the precomputed one or more modular exponentiations and one or more modular multiplications.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202202009T | 2022-02-28 | ||
SG10202202009T | 2022-02-28 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2023163654A2 WO2023163654A2 (en) | 2023-08-31 |
WO2023163654A3 true WO2023163654A3 (en) | 2023-10-05 |
Family
ID=87766816
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2023/050094 WO2023163654A2 (en) | 2022-02-28 | 2023-02-17 | Computer-implemented method, computer program and computer-readable medium using a chameleon hash function |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023163654A2 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
US20110208972A1 (en) * | 2008-05-29 | 2011-08-25 | Agency For Science, Technology And Research | Method of signing a message |
WO2020229925A1 (en) * | 2019-05-16 | 2020-11-19 | nChain Holdings Limited | Systems and methods for mining on a proof-of-work blockchain network |
-
2023
- 2023-02-17 WO PCT/SG2023/050094 patent/WO2023163654A2/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
US20110208972A1 (en) * | 2008-05-29 | 2011-08-25 | Agency For Science, Technology And Research | Method of signing a message |
WO2020229925A1 (en) * | 2019-05-16 | 2020-11-19 | nChain Holdings Limited | Systems and methods for mining on a proof-of-work blockchain network |
Non-Patent Citations (4)
Title |
---|
BRESSON E ET AL.: "Off-line/ on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results", INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 12, no. 6, 21 May 2013 (2013-05-21), pages 439 - 465, XP035339491, [retrieved on 20230831], DOI: 10.1007/S10207-013-0200-2 * |
CRUTCHFIELD C ET AL.: "Generic On-line /Off-line Threshold Signatures", INTERNATIONAL WORKSHOP ON PUBLIC KEY CRYPTOGRAPHY, 26 April 2006 (2006-04-26), pages 58 - 74, XP047448206, [retrieved on 20230831], DOI: 10.1007/11745853_5 * |
KRAWCZYK H, RABIN T: "Chameleon Signatures", PROCEEDINGS INTERNET SOCIETY SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, XX, XX, 1 January 2000 (2000-01-01), XX , pages 1 - 12, XP002383658 * |
SHAMIR A, TAUMAN Y: "IMPROVED ONLINE/OFFLINE SIGNATURE SCHEMES", ADVANCES IN CRYPTOLOGY. CRYPTO 2001. 21ST ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE, SANTA BARBARA, CA, AUG. 19 - 23, 2001. PROCEEDINGS., BERLIN : SPRINGER.; DE, 19 August 2001 (2001-08-19), pages 355 - 367, XP000988709, ISBN: 978-3-540-42456-7 * |
Also Published As
Publication number | Publication date |
---|---|
WO2023163654A2 (en) | 2023-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Auscher et al. | Weighted norm inequalities, off-diagonal estimates and elliptic operators. Part I: General operator theory and weights | |
Sun et al. | Complexity of triopoly price game in Chinese cold rolled steel market | |
Orcan et al. | Elastic–plastic stresses in linearly hardening rotating solid disks of variable thickness | |
Dickey | Rotationally symmetric solutions for shallow membrane caps | |
WO2023163654A3 (en) | Computer-implemented method, computer program and computer-readable medium using a chameleon hash function | |
Smith et al. | Need for Cognition and the Effects of Repeated Expression on Attitude Accessibility and Extremity. | |
Michaud | Estimating the probability of ruin for variable premiums by simulation | |
CN107145066A (en) | A kind of multi-parameters optimization method | |
Vanani et al. | On the numerical solution of neutral delay differential equations using multiquadric approximation scheme | |
Zolfaghari et al. | Application of the enhanced homotopy perturbation method to solve the fractional-order Bagley–Torvik differential equation | |
Dang et al. | Observer synthesis for the T–S fuzzy system with uncertainty and output disturbance | |
Gomez et al. | Scanning the space of parameters for stability regions of neutral type delay systems: A Lyapunov matrix approach | |
Rojas-Ricca et al. | Multiplicity-induced dominance in stabilization of state predictors for time-delay systems | |
Lin et al. | Varying dispersion diagnostics for inverse gaussian regression models | |
Bezekci et al. | Fast-slow asymptotic for semi-analytical ignition criteria in FitzHugh-Nagumo system | |
Tucker et al. | Multiple-Model Adaptive Estimation of a Hybrid Solid Oxide Fuel Cell Gas Turbine Power Plant Simulator | |
Segre | On the quartic surface | |
Baxley | Numerical solution of singular nonlinear boundary value problems | |
TWI253012B (en) | Method for square root computation | |
Hwang et al. | Stationary bootstrapping for semiparametric panel unit root tests | |
Sun et al. | Existence of positive solution for second-order nonlinear discrete system with parameter | |
Lin | Analytic semigroup generated by the linearization of a Riemann-Dafermos solution | |
O'Gorman | Regaining confidence in confidence intervals for the mean treatment effect | |
Izadian et al. | Solution of nonlinear Volterra and Fredholm integral equations by HAM | |
Borle et al. | Convergence acceleration of iterative methods for inverting real matrices using Frobenius norm minimization |