Author:
Gao Wei,Wang Xue-Li,Xie Dong-Qing
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference13 articles.
1. Krawczyk H, Rabin T. Chameleon signatures. In Proc. Symposium on Network and Distributed System Security Symposium (NDSS 2000), San Diego, CA, February, 2000, pp. 143–154.
2. Ateniese G, de Medeiros B. Identity-based chameleon hash and applications. In Proc. Financial Cryptography (FC’04), Key West, Florida, USA, February 9–12, 2004, Springer-Verlag, LNCS 3110, pp. 164–180.
3. Chen X, Zhang F, Kim K. Chameleon hashing without key exposure. In Proc. the 7th Information Security Conference (ISC’04), Palo Alto, USA, September 27–29, 2004, Springer-Verlag, LNCS 3225, pp. 87–98.
4. Ateniese G, de Medeiros B. On the key exposure problem in chameleon hashes. In Proc. the 4th Conference on Security in Communication Networks (SCN’04), Amalfi, Italy, September 8–10, 2004, Springer-Verlag, LNCS 3352, pp. 165–179.
5. MacKenzie P, Yang K. On simulation-sound trapdoor commitments. In Proc. EUROCRYPT’04, Interlaken, Switzerland, May 2–6, 2004, Springer-Verlag, LNCS 3027, pp. 382–400.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献