Sciweavers

4 search results - page 1 / 1
» On the Key Exposure Problem in Chameleon Hashes
Sort
View
111
Voted
ISW
2004
Springer
15 years 6 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
87
Voted
ACISP
2010
Springer
15 years 2 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
130
Voted
SCN
2004
Springer
123views Communications» more  SCN 2004»
15 years 6 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
160
Voted
NDSS
2000
IEEE
15 years 5 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin