Tightly secure chameleon hash functions in the multi-user setting and their applications
From MaRDI portal
Publication:2030892
DOI10.1007/978-3-030-55304-3_36zbMATH Open1464.94040OpenAlexW3048296053MaRDI QIDQ2030892FDOQ2030892
Authors: Shengli Liu, Xiang-Yu Liu, Dawu Gu
Publication date: 8 June 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-55304-3_36
Recommendations
- Tightly-Secure Signatures from Chameleon Hash Functions
- Efficient chameleon hash functions in the enhanced collision resistant model
- A characterization of chameleon hash functions and new, efficient designs
- One-time signatures and chameleon hash functions
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Cited In (7)
- Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions
- Financial Cryptography
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Efficient chameleon hash functions in the enhanced collision resistant model
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Tightly-Secure Signatures from Chameleon Hash Functions
This page was built for publication: Tightly secure chameleon hash functions in the multi-user setting and their applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2030892)