WO2023163654A3 - Computer-implemented method, computer program and computer-readable medium using a chameleon hash function - Google Patents

Computer-implemented method, computer program and computer-readable medium using a chameleon hash function Download PDF

Info

Publication number
WO2023163654A3
WO2023163654A3 PCT/SG2023/050094 SG2023050094W WO2023163654A3 WO 2023163654 A3 WO2023163654 A3 WO 2023163654A3 SG 2023050094 W SG2023050094 W SG 2023050094W WO 2023163654 A3 WO2023163654 A3 WO 2023163654A3
Authority
WO
WIPO (PCT)
Prior art keywords
computer
hash function
chameleon hash
implemented method
readable medium
Prior art date
Application number
PCT/SG2023/050094
Other languages
French (fr)
Other versions
WO2023163654A2 (en
Inventor
Binanda SENGUPTA
Anantharaman Lakshminarayanan
Original Assignee
Agency For Science, Technology And Research
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agency For Science, Technology And Research filed Critical Agency For Science, Technology And Research
Publication of WO2023163654A2 publication Critical patent/WO2023163654A2/en
Publication of WO2023163654A3 publication Critical patent/WO2023163654A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

In some aspects, a computer-implemented method using a chameleon hash function is provided. The chameleon hash function includes one or more modular exponentiations and one or more modular multiplications. The method includes, at a signature-verification phase: precomputing, at an offline phase of the signature-verification phase, at least partially each of the one or more modular exponentiations of the chameleon hash function; and evaluating, at an online phase of the signature-verification phase, the chameleon hash function based on the precomputed one or more modular exponentiations and one or more modular multiplications.
PCT/SG2023/050094 2022-02-28 2023-02-17 Computer-implemented method, computer program and computer-readable medium using a chameleon hash function WO2023163654A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG10202202009T 2022-02-28
SG10202202009T 2022-02-28

Publications (2)

Publication Number Publication Date
WO2023163654A2 WO2023163654A2 (en) 2023-08-31
WO2023163654A3 true WO2023163654A3 (en) 2023-10-05

Family

ID=87766816

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2023/050094 WO2023163654A2 (en) 2022-02-28 2023-02-17 Computer-implemented method, computer program and computer-readable medium using a chameleon hash function

Country Status (1)

Country Link
WO (1) WO2023163654A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6292897B1 (en) * 1997-11-03 2001-09-18 International Business Machines Corporation Undeniable certificates for digital signature verification
US20110208972A1 (en) * 2008-05-29 2011-08-25 Agency For Science, Technology And Research Method of signing a message
WO2020229925A1 (en) * 2019-05-16 2020-11-19 nChain Holdings Limited Systems and methods for mining on a proof-of-work blockchain network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6292897B1 (en) * 1997-11-03 2001-09-18 International Business Machines Corporation Undeniable certificates for digital signature verification
US20110208972A1 (en) * 2008-05-29 2011-08-25 Agency For Science, Technology And Research Method of signing a message
WO2020229925A1 (en) * 2019-05-16 2020-11-19 nChain Holdings Limited Systems and methods for mining on a proof-of-work blockchain network

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BRESSON E ET AL.: "Off-line/ on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results", INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 12, no. 6, 21 May 2013 (2013-05-21), pages 439 - 465, XP035339491, [retrieved on 20230831], DOI: 10.1007/S10207-013-0200-2 *
CRUTCHFIELD C ET AL.: "Generic On-line /Off-line Threshold Signatures", INTERNATIONAL WORKSHOP ON PUBLIC KEY CRYPTOGRAPHY, 26 April 2006 (2006-04-26), pages 58 - 74, XP047448206, [retrieved on 20230831], DOI: 10.1007/11745853_5 *
KRAWCZYK H, RABIN T: "Chameleon Signatures", PROCEEDINGS INTERNET SOCIETY SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, XX, XX, 1 January 2000 (2000-01-01), XX , pages 1 - 12, XP002383658 *
SHAMIR A, TAUMAN Y: "IMPROVED ONLINE/OFFLINE SIGNATURE SCHEMES", ADVANCES IN CRYPTOLOGY. CRYPTO 2001. 21ST ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE, SANTA BARBARA, CA, AUG. 19 - 23, 2001. PROCEEDINGS., BERLIN : SPRINGER.; DE, 19 August 2001 (2001-08-19), pages 355 - 367, XP000988709, ISBN: 978-3-540-42456-7 *

Also Published As

Publication number Publication date
WO2023163654A2 (en) 2023-08-31

Similar Documents

Publication Publication Date Title
Auscher et al. Weighted norm inequalities, off-diagonal estimates and elliptic operators. Part I: General operator theory and weights
Sun et al. Complexity of triopoly price game in Chinese cold rolled steel market
Orcan et al. Elastic–plastic stresses in linearly hardening rotating solid disks of variable thickness
Dickey Rotationally symmetric solutions for shallow membrane caps
WO2023163654A3 (en) Computer-implemented method, computer program and computer-readable medium using a chameleon hash function
Smith et al. Need for Cognition and the Effects of Repeated Expression on Attitude Accessibility and Extremity.
Michaud Estimating the probability of ruin for variable premiums by simulation
CN107145066A (en) A kind of multi-parameters optimization method
Vanani et al. On the numerical solution of neutral delay differential equations using multiquadric approximation scheme
Zolfaghari et al. Application of the enhanced homotopy perturbation method to solve the fractional-order Bagley–Torvik differential equation
Dang et al. Observer synthesis for the T–S fuzzy system with uncertainty and output disturbance
Gomez et al. Scanning the space of parameters for stability regions of neutral type delay systems: A Lyapunov matrix approach
Rojas-Ricca et al. Multiplicity-induced dominance in stabilization of state predictors for time-delay systems
Lin et al. Varying dispersion diagnostics for inverse gaussian regression models
Bezekci et al. Fast-slow asymptotic for semi-analytical ignition criteria in FitzHugh-Nagumo system
Tucker et al. Multiple-Model Adaptive Estimation of a Hybrid Solid Oxide Fuel Cell Gas Turbine Power Plant Simulator
Segre On the quartic surface
Baxley Numerical solution of singular nonlinear boundary value problems
TWI253012B (en) Method for square root computation
Hwang et al. Stationary bootstrapping for semiparametric panel unit root tests
Sun et al. Existence of positive solution for second-order nonlinear discrete system with parameter
Lin Analytic semigroup generated by the linearization of a Riemann-Dafermos solution
O'Gorman Regaining confidence in confidence intervals for the mean treatment effect
Izadian et al. Solution of nonlinear Volterra and Fredholm integral equations by HAM
Borle et al. Convergence acceleration of iterative methods for inverting real matrices using Frobenius norm minimization