Login / Signup
Identity-Based Chameleon Hash and Applications.
Giuseppe Ateniese
Breno de Medeiros
Published in:
Financial Cryptography (2004)
Keyphrases
</>
hash functions
signature scheme
encryption scheme
key management
data structure
signcryption scheme
b tree
authentication and key agreement
databases
genetic algorithm
neural network
sensor networks
binary codes
locality sensitive hashing
provably secure
blind signature
locality sensitive
bilinear pairings