Login / Signup
Identity-Based Chameleon Hash Scheme Without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Haibo Tian
Kwangjo Kim
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
hash functions
blind signature scheme
key distribution
secure communication
signcryption scheme
identity based cryptography
private key
key management
provably secure
secret sharing
bilinear pairings
neural network
secret sharing scheme
encryption scheme
blind signature
b tree
multiscale
genetic algorithm