One-time signatures and chameleon hash functions
From MaRDI portal
Publication:3084263
DOI10.1007/978-3-642-19574-7_21zbMATH Open1293.94090OpenAlexW1524587198MaRDI QIDQ3084263FDOQ3084263
Authors: Payman Mohassel
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_21
Recommendations
- A characterization of chameleon hash functions and new, efficient designs
- Chameleon hash functions and one-time signature schemes from inner automorphism groups
- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
- Tightly-Secure Signatures from Chameleon Hash Functions
- scientific article; zbMATH DE number 1759322
Cites Work
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai trees, or how to delegate a lattice basis
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Minimum disclosure proofs of knowledge
- Efficient signature generation by smart cards
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Theory of Cryptography
- Title not available (Why is that?)
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- On-line/off-line digital signatures
- Title not available (Why is that?)
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more
- Asymptotically Efficient Lattice-Based Digital Signatures
- Short and Stateless Signatures from the RSA Assumption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Generic Transformation to Strongly Unforgeable Signatures
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Cryptography - PKC 2006
- Topics in Cryptology – CT-RSA 2005
- Hash Functions from Sigma Protocols and Improvements to VSH
- Financial Cryptography
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- Title not available (Why is that?)
- Efficient hybrid encryption from ID-based encryption
- Title not available (Why is that?)
- Fail-Stop Signatures
- Information and Communications Security
- Short Hash-Based Signatures for Wireless Sensor Networks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (22)
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- New methods and abstractions for RSA-based forward secure signatures
- Signcryption schemes with threshold unsigncryption, and applications
- Structure-preserving signatures and commitments to group elements
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
- Title not available (Why is that?)
- Attribute-based versions of Schnorr and ElGamal
- Identity-based encryption in DDH hard groups
- Efficient chameleon hash functions in the enhanced collision resistant model
- An efficient post-quantum one-time signature scheme
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Efficient threshold encryption from lossy trapdoor functions
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
- A lattice-based fully dynamic group signature scheme without NIZK
- A characterization of chameleon hash functions and new, efficient designs
- Title not available (Why is that?)
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- Tightly-Secure Signatures from Chameleon Hash Functions
- General construction of chameleon all-but-one trapdoor functions
- Chameleon hash functions and one-time signature schemes from inner automorphism groups
This page was built for publication: One-time signatures and chameleon hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084263)