搜索结果: 1-14 共查到“军事学 Chameleon”相关记录14条 . 查询时间(0.127 秒)
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
Chameleon-Hash Implementation Blockchain
2019/4/23
Blockchain technologies recently received a considerable amount of attention. While the initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as Bitcoin, applicati...
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
digital signatures sanitizable signatures chameleon hashing
2018/11/6
A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoor...
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
SFE CCS'17
2017/12/1
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. Ch...
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
chameleon-hash functions chameleon-hash functions with ephemeral trapdoors trapdoor commitments
2017/2/20
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the noti...
Tightly-Secure Signatures from Chameleon Hash Functions
digital signatures standard model tight reduction
2016/1/5
We give a new framework for obtaining signatures with a tight security reduction from standard
hardness assumptions. Concretely, we show that any Chameleon Hash function can be transformed
into a (b...
Identity-Based Chameleon Hash Scheme Without Key Exposure
Chameleon hashing Identity-based system Key exposure
2009/8/18
In this paper, we propose the first identity-based chameleon hash
scheme without key exposure, which gives a positive answer for the open problem
introduced by Ateniese and de Medeiros in 2004.
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
Chameleon hashing Factoring problem Key exposure
2009/7/14
In this paper, we present some security
aws of the key-
exposure free chameleon hash scheme based on factoring [9]. Besides, we
propose an improved chameleon hash scheme without key exposure based...
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
Chameleon hashing Gap Diffie-Hellman group Key exposure
2009/6/11
Chameleon signatures are based on well established hash-and-sign
paradigm, where a chameleon hash function is used to compute the cryptographic
message digest. Chameleon signatures simultaneously pr...
Chameleon Signature from Bilinear Pairing
Digital signatures bilinear pairing chameleon hashing
2009/4/10
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is tha...
ID-Based Chameleon Hashes from Bilinear Pairings
Chameleon hash Chameleon signature ID-based cryptosystem Bilinear pairings
2009/4/10
Chameleon hash function is a trapdoor one-way hash func-
tion. The ID-based chameleon hash function was first introduced by Ate-
niese and Medeiros [1]. As discussed by [1], the general advantages o...
Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros
Digital signatures secure hash functions chameleon hashing
2009/4/9
Chameleon signatures are non-interactive signatures based on
a hash-and-sign paradigm, and similar in efficiency to regular signatures.
The distinguishing characteristic of chameleon signatures is t...
On the Key Exposure Problem in Chameleon Hashes
Digital signatures undeniable signatures collision-resistant hashing
2009/3/27
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature
schemes that provide non-transferability. However, that first construction employs a
chameleon hash that s...
Chameleon Hashing without Key Exposure
Chameleon hashing Gap Diffie-Hellman group Key exposure Digital signatures
2009/3/23
Chameleon signatures are based on well established hashand-
sign paradigm, where a chameleon hash function is used to compute
the cryptographic message digest. Chameleon signatures simultaneously
p...
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chameleon Deniability Authentication Key Agreement
2008/12/18
As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this ...