Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
暂无分享,去创建一个
Fei Li | Guilin Wang | Chunming Tang | Wei Gao | Kefei Chen
[1] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[2] Mihir Bellare,et al. A Characterization of Chameleon Hash Functions and New, Efficient Designs , 2014, Journal of Cryptology.
[3] Bertram Poettering,et al. Double-authentication-preventing signatures , 2014, International Journal of Information Security.
[4] Jin Li,et al. Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..
[5] Kwangjo Kim,et al. Discrete logarithm based chameleon hashing and signatures without key exposure , 2011, Comput. Electr. Eng..
[6] Sid Stamm,et al. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper) , 2011, Financial Cryptography.
[7] Payman Mohassel,et al. One-Time Signatures and Chameleon Hash Functions , 2010, Selected Areas in Cryptography.
[8] Fei Li,et al. Chameleon hash without key exposure based on Schnorr signature , 2009, Comput. Stand. Interfaces.
[9] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[10] Yi Mu,et al. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.
[11] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[12] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[13] Rosario Gennaro,et al. Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks , 2004, CRYPTO.
[14] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[15] Marc Fischlin,et al. Efficient Non-malleable Commitment Schemes , 2000, Journal of Cryptology.
[16] Amit Sahai,et al. Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems , 1998, CRYPTO.
[17] Birgit Pfitzmann,et al. Fail-Stop Signatures , 1997, SIAM J. Comput..
[18] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[19] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[20] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[21] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[22] Dongqing Xie,et al. Chameleon Hashes Without Key Exposure Based on Factoring , 2007, Journal of Computer Science and Technology.
[23] Marc Fischlin,et al. Efficient Non-Malleable Commitment Schemes , 2000, Annual International Cryptology Conference.