Sciweavers

4 search results - page 1 / 1
» On the Key Exposure Problem in Chameleon Hashes
Sort
View
ISW
2004
Springer
14 years 7 days ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ACISP
2010
Springer
13 years 8 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
SCN
2004
Springer
123views Communications» more  SCN 2004»
14 years 6 days ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
NDSS
2000
IEEE
13 years 11 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin