Tightly secure chameleon hash functions in the multi-user setting and their applications
From MaRDI portal
Publication:2030892
Recommendations
- Tightly-Secure Signatures from Chameleon Hash Functions
- Efficient chameleon hash functions in the enhanced collision resistant model
- A characterization of chameleon hash functions and new, efficient designs
- One-time signatures and chameleon hash functions
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Cited in
(7)- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Financial Cryptography
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Efficient chameleon hash functions in the enhanced collision resistant model
- Tightly-Secure Signatures from Chameleon Hash Functions
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions
This page was built for publication: Tightly secure chameleon hash functions in the multi-user setting and their applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2030892)