搜索结果: 1-4 共查到“军队指挥学 Chameleon-Hashes”相关记录4条 . 查询时间(0.062 秒)
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
digital signatures sanitizable signatures chameleon hashing
2018/11/6
A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoor...
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
chameleon-hash functions chameleon-hash functions with ephemeral trapdoors trapdoor commitments
2017/2/20
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the noti...
ID-Based Chameleon Hashes from Bilinear Pairings
Chameleon hash Chameleon signature ID-based cryptosystem Bilinear pairings
2009/4/10
Chameleon hash function is a trapdoor one-way hash func-
tion. The ID-based chameleon hash function was first introduced by Ate-
niese and Medeiros [1]. As discussed by [1], the general advantages o...
On the Key Exposure Problem in Chameleon Hashes
Digital signatures undeniable signatures collision-resistant hashing
2009/3/27
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature
schemes that provide non-transferability. However, that first construction employs a
chameleon hash that s...