Security in Communication Networks
From MaRDI portal
Publication:5491697
DOI10.1007/b105083zbMath1116.94309OpenAlexW2983337624MaRDI QIDQ5491697
Giuseppe Ateniese, B. de Medeiros
Publication date: 10 October 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b105083
undeniable signaturesDigital signaturestrapdoor commitmentschameleon hashingcollision-resistant hashingchameleon signatures
Related Items
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes ⋮ Efficient chameleon hash functions in the enhanced collision resistant model ⋮ Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks ⋮ On-line/off-line DCR-based homomorphic encryption and applications ⋮ Trapdoor Sanitizable Signatures and Their Application to Content Protection ⋮ New unbounded verifiable data streaming for batch query with almost optimal overhead ⋮ Identity-based chameleon hashing and signatures without key exposure ⋮ A characterization of chameleon hash functions and new, efficient designs ⋮ Efficient generic on-line/off-line (threshold) signatures without key exposure ⋮ Chameleon-Hashes with Ephemeral Trapdoors ⋮ New receipt-free voting scheme using double-trapdoor commitment ⋮ Sanitizable Signatures