DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, X. | ko |
dc.contributor.author | Zhang, F. | ko |
dc.contributor.author | Susilo, W. | ko |
dc.contributor.author | Tian, H. | ko |
dc.contributor.author | Li, J. | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2013-03-28T10:44:22Z | - |
dc.date.available | 2013-03-28T10:44:22Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2010-07-05 | - |
dc.identifier.citation | 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/164987 | - |
dc.description.abstract | The notion of chameleon hash function without key exposure plays an important role in designing chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2009, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based chameleon hashing without key exposure. In this paper, we propose the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem. | - |
dc.language | English | - |
dc.publisher | ACISP 2010 | - |
dc.title | Identity-based chameleon hash scheme without key exposure | - |
dc.type | Conference | - |
dc.identifier.wosid | 000284032000013 | - |
dc.identifier.scopusid | 2-s2.0-78649844945 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 200 | - |
dc.citation.endingpage | 215 | - |
dc.citation.publicationname | 15th Australasian Conference on Information Security and Privacy, ACISP 2010 | - |
dc.identifier.conferencecountry | AT | - |
dc.identifier.conferencelocation | Sydney, NSW | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Chen, X. | - |
dc.contributor.nonIdAuthor | Zhang, F. | - |
dc.contributor.nonIdAuthor | Susilo, W. | - |
dc.contributor.nonIdAuthor | Tian, H. | - |
dc.contributor.nonIdAuthor | Li, J. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.