메뉴 건너뛰기




Volumn 6584 LNCS, Issue , 2011, Pages 415-426

Comments and improvements on key-exposure free chameleon hashing based on factoring

Author keywords

Chameleon hashing; Factoring problem; Key exposure

Indexed keywords

CHAMELEON HASHING; CHAMELEON SIGNATURES; FACTORING PROBLEM; HASH SCHEME; KEY EXPOSURE; NON-REPUDIATION; NON-TRANSFERABILITY; SECURITY FLAWS; SECURITY NOTION; NON REPUDIATION;

EID: 79960816826     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21518-6_29     Document Type: Conference Paper
Times cited : (13)

References (13)
  • 1
    • 35048873387 scopus 로고    scopus 로고
    • Identity-based chameleon hash and applications
    • Juels, A. (ed.) FC 2004. Springer, Heidelberg
    • Ateniese, G., de Medeiros, B.: Identity-based chameleon hash and applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164-180. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3110 , pp. 164-180
    • Ateniese, G.1    De Medeiros, B.2
  • 2
    • 23944526438 scopus 로고    scopus 로고
    • On the key exposure problem in chameleon hashes
    • Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
    • Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165-179. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3352 , pp. 165-179
    • Ateniese, G.1    De Medeiros, B.2
  • 3
    • 0000090958 scopus 로고    scopus 로고
    • The Exact Security of Digital Signatures - How to Sign with RSA and Rabin
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 212-216
    • Chaum, D.1    Van Antwerpen, H.2
  • 5
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Honary, B. (ed.) Cryptography and Coding 2001. Springer, Heidelberg
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 6
    • 35048828982 scopus 로고    scopus 로고
    • Chameleon hashing without key exposure
    • Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
    • Chen, X., Zhang, F., Kim, K.: Chameleon hashing without key exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87-98. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3225 , pp. 87-98
    • Chen, X.1    Zhang, F.2    Kim, K.3
  • 8
    • 78649844945 scopus 로고    scopus 로고
    • Identity-based chameleon hash scheme without key exposure
    • Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. Springer, Heidelberg
    • Chen, X., Zhang, F., Susilo,W., Tian, H., Li, J., Kim, K.: Identity-based chameleon hash scheme without key exposure. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 200-215. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6168 , pp. 200-215
    • Chen, X.1    Zhang, F.2    Susilo, W.3    Tian, H.4    Li, J.5    Kim, K.6
  • 9
    • 84944898222 scopus 로고    scopus 로고
    • The representation problem based on factoring
    • Preneel, B. (ed.) CT-RSA 2002. Springer, Heidelberg
    • Fischlin, M., Fischlin, R.: The representation problem based on factoring. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 96-113. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2271 , pp. 96-113
    • Fischlin, M.1    Fischlin, R.2
  • 10
    • 33847010568 scopus 로고    scopus 로고
    • Chameleon hashes without key exposure based on factoring
    • Gao, W., Wang, X., Xie, D.: Chameleon hashes without key exposure based on factoring. Journal of Computer Science and Technology 22(1), 109-113 (2007)
    • (2007) Journal of Computer Science and Technology , vol.22 , Issue.1 , pp. 109-113
    • Gao, W.1    Wang, X.2    Xie, D.3
  • 11
    • 55749094141 scopus 로고    scopus 로고
    • Chameleon hash without key exposure based on Schnorr signature
    • Gao, W., Li, F., Wang, X.: Chameleon hash without key exposure based on Schnorr signature. Computer Standards and Interfaces 31, 282-285 (2009)
    • (2009) Computer Standards and Interfaces , vol.31 , pp. 282-285
    • Gao, W.1    Li, F.2    Wang, X.3
  • 12
    • 33745858270 scopus 로고    scopus 로고
    • New online/offline signature schemes without random oracles
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
    • Kurosawa, K., Schmidt-Samoa, K.: New online/offline signature schemes without random oracles. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 330-346. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3958 , pp. 330-346
    • Kurosawa, K.1    Schmidt-Samoa, K.2
  • 13
    • 0010251473 scopus 로고    scopus 로고
    • Chameleon hashing and signatures
    • Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. In: Proc. of NDSS 2000, pp. 143-154 (2000)
    • (2000) Proc. of NDSS 2000 , pp. 143-154
    • Krawczyk, H.1    Rabin, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.