Identity-based chameleon hashing and signatures without key exposure
- 1 May 2014
- journal article
- Published by Elsevier BV in Information Sciences
- Vol. 265, 198-210
- https://doi.org/10.1016/j.ins.2013.12.020
Abstract
No abstract availableThis publication has 5 references indexed in Scilit:
- Discrete logarithm based chameleon hashing and signatures without key exposureComputers and Electrical Engineering, 2011
- Chameleon hash without key exposure based on Schnorr signatureComputer Standards & Interfaces, 2009
- Chameleon Hashes Without Key Exposure Based on FactoringJournal of Computer Science and Technology, 2007
- The Weil Pairing, and Its Efficient CalculationJournal of Cryptology, 2004
- Efficient signature generation by smart cardsJournal of Cryptology, 1991