Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Twin signatures: an alternative to the hash-and-sign paradigm
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Paillier's cryptosystem revisited
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Improved Online/Offline Signature Schemes
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Addressing the shortcomings of one-way chains
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Digitally signed document sanitizing scheme based on bilinear maps
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Chameleon hash without key exposure based on Schnorr signature
Computer Standards & Interfaces
Invisibly Sanitizable Digital Signature Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Security of Sanitizable Signatures Revisited
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Chameleon hashes without key exposure based on factoring
Journal of Computer Science and Technology
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Trapdoor sanitizable signatures and their application to content protection
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Group-based attestation: enhancing privacy and management in remote attestation
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Trapdoor sanitizable signatures made easy
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Identity-based chameleon hash scheme without key exposure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences: an International Journal
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Hierarchical identity-based chameleon hash and its applications
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Comments and improvements on key-exposure free chameleon hashing based on factoring
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Three-round abuse-free optimistic contract signing with everlasting secrecy
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Extended sanitizable signatures
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Proceedings of the 2012 ACM conference on Computer and communications security
Efficient ID-based non-malleable trapdoor commitment
Computers and Electrical Engineering
Efficient and robust identity-based handoff authentication in wireless networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Efficient online/offline signcryption without key exposure
International Journal of Grid and Utility Computing
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Identity-based chameleon hashing and signatures without key exposure
Information Sciences: an International Journal
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.00 |
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a chameleon hash that suffers from a key exposure problem: The non-transferability property requires willingness of the recipient in consequentially exposing a secret key, and therefore invalidating all signatures issued to the same recipient's public key. To address this key-revocation issue, and its attending problems of key redistribution, storage of state information, and greater need for interaction, an identity-based scheme was proposed in [1], while a fully key-exposure free construction, based on the elliptic curves with pairings, appeared later in [7]. Herein we provide several constructions of exposure-free chameleon hash functions based on different cryptographic assumptions, such as the RSA and the discrete logarithm assumptions. One of the schemes is a novel construction that relies on a single trapdoor and therefore may potentially be realized over a large set of cryptographic groups (where the discrete logarithm is hard).