搜索结果: 1-3 共查到“军队指挥学 Chameleon Hash”相关记录3条 . 查询时间(0.062 秒)
Tightly-Secure Signatures from Chameleon Hash Functions
digital signatures standard model tight reduction
2016/1/5
We give a new framework for obtaining signatures with a tight security reduction from standard
hardness assumptions. Concretely, we show that any Chameleon Hash function can be transformed
into a (b...
Identity-Based Chameleon Hash Scheme Without Key Exposure
Chameleon hashing Identity-based system Key exposure
2009/8/18
In this paper, we propose the first identity-based chameleon hash
scheme without key exposure, which gives a positive answer for the open problem
introduced by Ateniese and de Medeiros in 2004.
Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros
Digital signatures secure hash functions chameleon hashing
2009/4/9
Chameleon signatures are non-interactive signatures based on
a hash-and-sign paradigm, and similar in efficiency to regular signatures.
The distinguishing characteristic of chameleon signatures is t...