1. Khalili, M., Dakhilalian, M., Susilo, W.: Efficient chameleon hash functions in the enhanced collision resistant model. Inf. Sci. 510, 155–164 (2020)
2. Kate, A., Huang, Y., Goldberg, I.: Distributed key generation in the wild. Cryptology ePrint Archive, Report 2012/377 (2012).
https://eprint.iacr.org/2012/377
3. Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA (2000)
4. Lecture Notes in Computer Science;G Ateniese,2005
5. Lecture Notes in Computer Science;X Chen,2004