Publisher
Zhejiang University Press
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing
Reference25 articles.
1. Ateniese G, de Medeiros B, 2004a. Identity–based chameleon hash and applications. Int Conf on Financial Cryptography, p.164–180. https://doi.org/10.1007/978–3–540–27809–2_19
2. Ateniese G, de Medeiros B, 2004b. On the key exposure problem in chameleon hashes. Int Conf on Security in Communication Networks, p.165–179. https://doi.org/10.1007/978–3–540–30598–9_12
3. Bellare M, Ristov T, 2014. A characterization of chameleon hash functions and new, efficient designs. J Cryptol, 27(4):799–823. https://doi.org/10.1007/s00145–013–9155–8
4. Bellare M, Halevi S, Sahai A, et al., 1998. Many–to–one trapdoor functions and their relation to public–key cryptosystems. Annual Int Cryptology Conf, p.283–298. https://doi.org/10.1007/BFb0055735
5. Chaum D, Fiat A, Naor M, 1988. Untraceable electronic cash. Conf on the Theory and Application of Cryptography, p.319–327. https://doi.org/10.1007/0–387–34799–2_25
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献