Security in Communication Networks
From MaRDI portal
Publication:5491697
DOI10.1007/B105083zbMATH Open1116.94309OpenAlexW2983337624MaRDI QIDQ5491697FDOQ5491697
Authors: Giuseppe Ateniese, B. de Medeiros
Publication date: 10 October 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b105083
Recommendations
- Comments and improvements on key-exposure free chameleon hashing based on factoring
- Discrete logarithm based chameleon hashing and signatures without key exposure
- Identity-based chameleon hashing and signatures without key exposure
- Information Security
- ID-based chameleon hashing and chameleon signature based on GQ scheme
undeniable signaturesDigital signaturestrapdoor commitmentschameleon hashingcollision-resistant hashingchameleon signatures
Cited In (24)
- Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- An ID-based chameleon hash scheme and signature without key escrow
- Information Security
- New receipt-free voting scheme using double-trapdoor commitment
- New unbounded verifiable data streaming for batch query with almost optimal overhead
- ID-based chameleon hashing and chameleon signature based on GQ scheme
- Trapdoor Sanitizable Signatures and Their Application to Content Protection
- On-line/off-line DCR-based homomorphic encryption and applications
- Sanitizable signatures
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Revocable policy-based chameleon hash
- Chameleon-hashes with dual long-term trapdoors and their applications
- Efficient chameleon hash functions in the enhanced collision resistant model
- Efficient generic on-line/off-line (threshold) signatures without key exposure
- Identity-based chameleon hashing and signatures without key exposure
- Tagged chameleon hash from lattices and application to redactable blockchain
- A characterization of chameleon hash functions and new, efficient designs
- Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
- Comments and improvements on key-exposure free chameleon hashing based on factoring
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- Discrete logarithm based chameleon hashing and signatures without key exposure
- Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
- Chameleon hash functions and one-time signature schemes from inner automorphism groups
This page was built for publication: Security in Communication Networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5491697)