Paper 2004/038
Chameleon Hashing without Key Exposure
Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim
Abstract
Chameleon signatures are based on well established hash-and-sign
paradigm, where a \emph{chameleon hash function} is used to
compute the cryptographic message digest. Chameleon signatures
simultaneously provide the properties of non-repudiation and
non-transferability for the signed message,
Metadata
- Available format(s)
-
PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Chameleon hashingGap Diffie-Hellman groupKey exposureDigital signatures.
- Contact author(s)
- crazymount @ icu ac kr
- History
- 2004-02-16: received
- Short URL
- https://ia.cr/2004/038
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2004/038, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, title = {Chameleon Hashing without Key Exposure}, howpublished = {Cryptology {ePrint} Archive, Paper 2004/038}, year = {2004}, url = {https://eprint.iacr.org/2004/038} }