Financial Cryptography
From MaRDI portal
Publication:4680924
DOI10.1007/B98935zbMATH Open1105.94302OpenAlexW4251262790MaRDI QIDQ4680924FDOQ4680924
Authors: Giuseppe Ateniese, B. de Medeiros
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98935
Recommendations
- Identity-based chameleon hashing and signatures without key exposure
- An ID-based chameleon hash scheme and signature without key escrow
- ID-based chameleon hashing and chameleon signature based on GQ scheme
- Tightly secure chameleon hash functions in the multi-user setting and their applications
- Identity-based extractable hash proofs and their applications
- Anonymous Identity-Based Hash Proof System and Its Applications
- A characterization of chameleon hash functions and new, efficient designs
- Tightly-Secure Signatures from Chameleon Hash Functions
Cited In (23)
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- An ID-based chameleon hash scheme and signature without key escrow
- Still wrong use of pairings in cryptography
- New receipt-free voting scheme using double-trapdoor commitment
- Trapdoor Sanitizable Signatures and Their Application to Content Protection
- On-line/off-line DCR-based homomorphic encryption and applications
- Sanitizable signatures
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Identity-based trapdoor mercurial commitments and applications
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- A framework for constructing convertible undeniable signatures
- Revocable policy-based chameleon hash
- CRT-based outsourcing algorithms for modular exponentiations
- Efficient chameleon hash functions in the enhanced collision resistant model
- Concise mercurial vector commitments and independent zero-knowledge sets with short proofs
- Efficient generic on-line/off-line (threshold) signatures without key exposure
- One-time signatures and chameleon hash functions
- Identity-based chameleon hashing and signatures without key exposure
- A characterization of chameleon hash functions and new, efficient designs
- Revocable policy-based chameleon hash using lattices
- Partial bits exposure attacks on a new commitment scheme based on the Zagier polynomial
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- Anonymous Identity-Based Hash Proof System and Its Applications
This page was built for publication: Financial Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680924)