Tightly secure chameleon hash functions in the multi-user setting and their applications
From MaRDI portal
Publication:2030892
Recommendations
- Tightly-Secure Signatures from Chameleon Hash Functions
- Efficient chameleon hash functions in the enhanced collision resistant model
- A characterization of chameleon hash functions and new, efficient designs
- One-time signatures and chameleon hash functions
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Cited in
(7)- Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions
- Financial Cryptography
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Efficient chameleon hash functions in the enhanced collision resistant model
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Tightly-Secure Signatures from Chameleon Hash Functions
This page was built for publication: Tightly secure chameleon hash functions in the multi-user setting and their applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2030892)