Identity-based Chameleon Hash and Applications.
Giuseppe AtenieseBreno de MedeirosPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- hash functions
- signature scheme
- key management
- encryption scheme
- data structure
- signcryption scheme
- hashing algorithm
- b tree
- authentication and key agreement
- databases
- hash table
- provably secure
- proxy re encryption
- data sets
- web services
- public key
- website
- artificial intelligence
- standard model
- ciphertext
- blind signature scheme
- locality sensitive
- database