메뉴 건너뛰기




Volumn 22, Issue 1, 2007, Pages 109-113

Chameleon hashes without key exposure based on factoring

Author keywords

Chameleon hash; Chameleon signature; Key exposure

Indexed keywords

CHAMELEON HASH; CHAMELEON SIGNATURE; KEY-EXPOSURE;

EID: 33847010568     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-007-9015-9     Document Type: Article
Times cited : (15)

References (13)
  • 2
    • 35048873387 scopus 로고    scopus 로고
    • Ateniese G, de Medeiros B. Identity-based chameleon hash and applications. In Proc. Financial Cryptography (FC'04), Key West, Florida, USA, February 9-12, 2004, Springer-Verlag, LNCS 3110, pp.164-180.
    • Ateniese G, de Medeiros B. Identity-based chameleon hash and applications. In Proc. Financial Cryptography (FC'04), Key West, Florida, USA, February 9-12, 2004, Springer-Verlag, LNCS 3110, pp.164-180.
  • 3
    • 35048828982 scopus 로고    scopus 로고
    • Chameleon hashing without key exposure
    • Proc. the 7th Information Security Conference ISC'04, Palo Alto, USA, September 27-29, SpringerVerlag
    • Chen X, Zhang F, Kim K. Chameleon hashing without key exposure. In Proc. the 7th Information Security Conference (ISC'04), Palo Alto, USA, September 27-29, 2004, SpringerVerlag, LNCS 5225, pp.87-98.
    • (2004) LNCS , vol.5225 , pp. 87-98
    • Chen, X.1    Zhang, F.2    Kim, K.3
  • 4
    • 23944526438 scopus 로고    scopus 로고
    • On the key exposure problem in chameleon hashes
    • Proc. the 4th Conference on Security in Communication Networks SCN'04, Amalfi, Italy, September 8-10, Springer-Verlag
    • Ateniese G, de Medeiros B. On the key exposure problem in chameleon hashes. In Proc. the 4th Conference on Security in Communication Networks (SCN'04), Amalfi, Italy, September 8-10, 2004, Springer-Verlag, LNCS 5552, pp.165-179.
    • (2004) LNCS , vol.5552 , pp. 165-179
    • Ateniese, G.1    de Medeiros, B.2
  • 5
    • 35048882590 scopus 로고    scopus 로고
    • On simulation-sound trapdoor commitments
    • Proc. EUROCRYPT'04, Interlaken, Switzerland, May 2-6, Springer-Verlag
    • MacKenzie P, Yang K. On simulation-sound trapdoor commitments. In Proc. EUROCRYPT'04, Interlaken, Switzerland, May 2-6, 2004, Springer-Verlag, LNCS 5027, pp.382-400.
    • (2004) LNCS , vol.5027 , pp. 382-400
    • MacKenzie, P.1    Yang, K.2
  • 6
    • 26444461753 scopus 로고    scopus 로고
    • Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks
    • CRYPTO'04, Santa Barbara, California, USA, August 15-19, Springer-Verlag
    • Gennaro R. Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. In CRYPTO'04, Santa Barbara, California, USA, August 15-19, 2004, Springer-Verlag, LNCS 3152, pp. 220-236.
    • (2004) LNCS , vol.3152 , pp. 220-236
    • Gennaro, R.1
  • 7
    • 18244402163 scopus 로고    scopus 로고
    • Implementation of cryptosystems based on Tate pairing
    • Hu L, Dong J, Pei D. Implementation of cryptosystems based on Tate pairing. J. Comput. Sci. & Technol, 2005, 20(2): 264-269.
    • (2005) J. Comput. Sci. & Technol , vol.20 , Issue.2 , pp. 264-269
    • Hu, L.1    Dong, J.2    Pei, D.3
  • 8
    • 0347802687 scopus 로고
    • Digital signatures
    • Dobkin D, Jones A, Lipton R eds, New York: Academic Press
    • Rabin M. Digital signatures. Foundations of Secure Computation. Dobkin D, Jones A, Lipton R (eds.), New York: Academic Press, 1978, pp.155-168.
    • (1978) Foundations of Secure Computation , pp. 155-168
    • Rabin, M.1
  • 9
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Fairfax, VA, November 3-5
    • Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. the 1st ACM Conf. Computer and Communications Security, Fairfax, VA, November 3-5, 1993, pp.62-73.
    • (1993) Proc. the 1st ACM Conf. Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 0023985465 scopus 로고    scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 1998, 17(2): pp. 281-308.
    • (1998) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • Proc. Eurocrypt'2004, Interlaken, Switzerland, May 2-6, Springer-Verlag
    • Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes. In Proc. Eurocrypt'2004, Interlaken, Switzerland, May 2-6, 2004, Springer-Verlag, LNCS 5027, pp. 268-286.
    • (2004) LNCS , vol.5027 , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 12
    • 0000090958 scopus 로고    scopus 로고
    • The exact security of digital signatures: How to sign with RSA and Rabin
    • Proc. Eurocrypt 96, Zaragoza, Spain, May 12-16, Springer-Verlag
    • Bellare M, Rogaway P. The exact security of digital signatures: How to sign with RSA and Rabin. In Proc. Eurocrypt 96, Zaragoza, Spain, May 12-16, 1996, Springer-Verlag, LNCS 1070, pp.399-416.
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 13
    • 84944898222 scopus 로고    scopus 로고
    • The representation problem based on factoring
    • Proc. the Cryptographer's Track at the RSA Conference on Topics in Cryptology 2002 Topics in Cryptology-CT-RSA 2002, San Jose, CA, USA, February 18-22, Springer-Verlag
    • Fischlin M, Fischlin R. The representation problem based on factoring. In Proc. the Cryptographer's Track at the RSA Conference on Topics in Cryptology 2002 (Topics in Cryptology-CT-RSA 2002), San Jose, CA, USA, February 18-22, 2002, Springer-Verlag, LNCS 2271, pp.96-113.
    • (2002) LNCS , vol.2271 , pp. 96-113
    • Fischlin, M.1    Fischlin, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.