-
1
-
-
35048873387
-
Identity-based chameleon hash and applications
-
Juels, A. (ed.) FC 2004. Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: Identity-based chameleon hash and applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164-180. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 164-180
-
-
Ateniese, G.1
De Medeiros, B.2
-
2
-
-
23944526438
-
On the key exposure problem in chameleon hashes
-
Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165-179. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3352
, pp. 165-179
-
-
Ateniese, G.1
De Medeiros, B.2
-
3
-
-
0000090958
-
The Exact Security of Digital Signatures - How to Sign with RSA and Rabin
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0010252194
-
Undeniable signatures
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
5
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Honary, B. (ed.) Cryptography and Coding 2001. Springer, Heidelberg
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
6
-
-
35048828982
-
Chameleon hashing without key exposure
-
Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
-
Chen, X., Zhang, F., Kim, K.: Chameleon hashing without key exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87-98. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3225
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
7
-
-
77957013960
-
-
Chen, X., Zhang, F., Susilo, W., Mu, Y., Lee, H., Kim, K.: Key-exposure free chameleon hashing and signatures based on discrete logarithm systems, http://eprint.iacr.org/2009/035
-
Key-exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Mu, Y.4
Lee, H.5
Kim, K.6
-
8
-
-
78649844945
-
Identity-based chameleon hash scheme without key exposure
-
Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. Springer, Heidelberg
-
Chen, X., Zhang, F., Susilo,W., Tian, H., Li, J., Kim, K.: Identity-based chameleon hash scheme without key exposure. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 200-215. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6168
, pp. 200-215
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Tian, H.4
Li, J.5
Kim, K.6
-
9
-
-
84944898222
-
The representation problem based on factoring
-
Preneel, B. (ed.) CT-RSA 2002. Springer, Heidelberg
-
Fischlin, M., Fischlin, R.: The representation problem based on factoring. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 96-113. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2271
, pp. 96-113
-
-
Fischlin, M.1
Fischlin, R.2
-
10
-
-
33847010568
-
Chameleon hashes without key exposure based on factoring
-
Gao, W., Wang, X., Xie, D.: Chameleon hashes without key exposure based on factoring. Journal of Computer Science and Technology 22(1), 109-113 (2007)
-
(2007)
Journal of Computer Science and Technology
, vol.22
, Issue.1
, pp. 109-113
-
-
Gao, W.1
Wang, X.2
Xie, D.3
-
11
-
-
55749094141
-
Chameleon hash without key exposure based on Schnorr signature
-
Gao, W., Li, F., Wang, X.: Chameleon hash without key exposure based on Schnorr signature. Computer Standards and Interfaces 31, 282-285 (2009)
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 282-285
-
-
Gao, W.1
Li, F.2
Wang, X.3
-
12
-
-
33745858270
-
New online/offline signature schemes without random oracles
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
-
Kurosawa, K., Schmidt-Samoa, K.: New online/offline signature schemes without random oracles. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 330-346. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3958
, pp. 330-346
-
-
Kurosawa, K.1
Schmidt-Samoa, K.2
-
13
-
-
0010251473
-
Chameleon hashing and signatures
-
Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. In: Proc. of NDSS 2000, pp. 143-154 (2000)
-
(2000)
Proc. of NDSS 2000
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
|