Comments and improvements on key-exposure free chameleon hashing based on factoring
From MaRDI portal
Publication:3019944
Recommendations
Cited in
(9)- Security in Communication Networks
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- Information Security
- ID-based chameleon hashing and chameleon signature based on GQ scheme
- Efficient chameleon hash functions in the enhanced collision resistant model
- Identity-based chameleon hashing and signatures without key exposure
- Tagged chameleon hash from lattices and application to redactable blockchain
- Revocable policy-based chameleon hash using lattices
- Discrete logarithm based chameleon hashing and signatures without key exposure
This page was built for publication: Comments and improvements on key-exposure free chameleon hashing based on factoring
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3019944)