메뉴 건너뛰기




Volumn 3225, Issue , 2004, Pages 87-98

Chameleon hashing without key exposure

Author keywords

Chameleon hashing; Gap diffie hellman group; Key exposure

Indexed keywords

HASH FUNCTIONS; NETWORK SECURITY; SECURITY OF DATA;

EID: 35048828982     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30144-8_8     Document Type: Article
Times cited : (96)

References (25)
  • 2
    • 0032682993 scopus 로고    scopus 로고
    • The limited verifier signature and its application
    • S. Araki, S. Uehara, and K. Imamura, The limited verifier signature and its application, IEICE Trans. Fundamentals, vol.E82-A, No.l, pp.63-68, 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.50 , pp. 63-68
    • Araki, S.1    Uehara, S.2    Imamura, K.3
  • 4
  • 7
    • 84948970342 scopus 로고
    • Advances in Cryptology-Eurocrypt 1994, LNCS 950, Springer-Verlag
    • D. Chaum, Designated confirmer signatures, Advances in Cryptology-Eurocrypt 1994, LNCS 950, pp.86-91, Springer-Verlag, 1994.
    • (1994) Designated Confirmer Signatures , pp. 86-91
    • Chaum, D.1
  • 8
    • 85043778396 scopus 로고
    • Advances in Cryptology-Eurocrypt 1990, LNCS 473, Springer-Verlag
    • D. Chaum, Zero-knowledge undeniable signatures, Advances in Cryptology-Eurocrypt 1990, LNCS 473, pp.458-464, Springer-Verlag, 1991.
    • (1991) Zero-knowledge Undeniable Signatures , pp. 458-464
    • Chaum, D.1
  • 9
    • 0010252194 scopus 로고
    • Advances in Cryptology-Crypto 1989, LNCS 435, Springer-Verlag
    • D. Chaum and H. van Antwerpen, Undeniable signatures, Advances in Cryptology-Crypto 1989, LNCS 435, pp.212-216, Springer-Verlag, 1989.
    • (1989) Undeniable Signatures , pp. 212-216
    • Chaum, D.1    Van Antwerpen, H.2
  • 13
    • 84958770476 scopus 로고
    • Advances in Cryptology-Eurocrypt 1991, LNCS 547, Springer-Verlag
    • Y. Desmedt and M. Yung, Weaknesses of undeniable signature schemes, Advances in Cryptology-Eurocrypt 1991, LNCS 547, pp.205-220, Springer-Verlag, 1992.
    • (1992) Weaknesses of Undeniable Signature Schemes , pp. 205-220
    • Desmedt, Y.1    Yung, M.2
  • 16
  • 18
    • 84927728020 scopus 로고
    • Advances in CryptologyEurocrypt 1994, LNCS 950, Springer-Verlag
    • M. Jakobsson, Blackmailing using undeniable signatures, Advances in CryptologyEurocrypt 1994, LNCS 950, pp.425-427, Springer-Verlag, 1994.
    • (1994) Blackmailing Using Undeniable Signatures , pp. 425-427
    • Jakobsson, M.1
  • 20
    • 0010251473 scopus 로고    scopus 로고
    • Chameleon hashing and signatures
    • H. Krawczyk and T. Rabin, Chameleon hashing and signatures, Proc. of NDSS 2000, pp.143-154, 2000.
    • (2000) Proc. of NDSS , vol.2000 , pp. 143-154
    • Krawczyk, H.1    Rabin, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.