Bringing order to chaos: the case of collision-resistant chameleon-hashes
From MaRDI portal
Publication:6595845
DOI10.1007/s00145-024-09510-9zbMATH Open1546.94066MaRDI QIDQ6595845
Kai Samelin, Daniel Slamanig, David Derler
Publication date: 30 August 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A characterization of chameleon hash functions and new, efficient designs
- Policy-based sanitizable signatures
- Minimum disclosure proofs of knowledge
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- On-line/off-line digital signatures
- Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Efficient chameleon hash functions in the enhanced collision resistant model
- Efficient Fully Structure-Preserving Signatures for Large Messages
- On the Non-malleability of the Fiat-Shamir Transform
- Tightly-Secure Signatures from Chameleon Hash Functions
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- One-Time Signatures and Chameleon Hash Functions
- Short and Stateless Signatures from the RSA Assumption
- Bonsai Trees, or How to Delegate a Lattice Basis
- Hash Functions from Sigma Protocols and Improvements to VSH
- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Security of Sanitizable Signatures Revisited
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Financial Cryptography
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Security in Communication Networks
- Information Security
- Chameleon-Hashes with Ephemeral Trapdoors
- Sanitizable Signatures
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Bringing order to chaos: the case of collision-resistant chameleon-hashes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595845)