Identity-based chameleon hashing and signatures without key exposure
From MaRDI portal
Publication:903661
DOI10.1016/j.ins.2013.12.020zbMath1328.94063OpenAlexW2124406434MaRDI QIDQ903661
Xiaofeng Chen, Kwangjo Kim, Fangguo Zhang, Willy Susilo, Jin Li, Haibo Tian
Publication date: 14 January 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://ro.uow.edu.au/cgi/viewcontent.cgi?article=3229&context=eispapers
Related Items (4)
Efficient chameleon hash functions in the enhanced collision resistant model ⋮ Notes on a provably-secure certificate-based encryption against malicious CA attacks ⋮ A more efficient leveled strongly-unforgeable fully homomorphic signature scheme ⋮ Tightly secure signature schemes from the LWE and subset sum assumptions
Cites Work
- Efficient signature generation by smart cards
- The Weil pairing, and its efficient calculation
- Discrete logarithm based chameleon hashing and signatures without key exposure
- Designated Verifier Proofs and Their Applications
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Identity-Based Cryptosystems and Signature Schemes
- Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring
- Undeniable Signatures
- Relations Among Security Notions for Undeniable Signature Schemes
- Convertible Undeniable Signatures
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Financial Cryptography
- Advances in Cryptology – CRYPTO 2004
- 3-Move Undeniable Signature Scheme
- Generic Homomorphic Undeniable Signatures
- Security in Communication Networks
- Information Security
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2004
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Identity-based chameleon hashing and signatures without key exposure