搜索结果: 1-4 共查到“军事学 chameleon hashing”相关记录4条 . 查询时间(0.062 秒)
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
Chameleon-Hash Implementation Blockchain
font style='font-size:12px;'>
2019/4/23
Blockchain technologies recently received a considerable amount of attention. While the initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as Bitcoin, applicati...
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
Chameleon hashing Factoring problem Key exposure
font style='font-size:12px;'>
2009/7/14
In this paper, we present some security
aws of the key-
exposure free chameleon hash scheme based on factoring [9]. Besides, we
propose an improved chameleon hash scheme without key exposure based...
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
Chameleon hashing Gap Diffie-Hellman group Key exposure
font style='font-size:12px;'>
2009/6/11
Chameleon signatures are based on well established hash-and-sign
paradigm, where a chameleon hash function is used to compute the cryptographic
message digest. Chameleon signatures simultaneously pr...
Chameleon Hashing without Key Exposure
Chameleon hashing Gap Diffie-Hellman group Key exposure Digital signatures
font style='font-size:12px;'>
2009/3/23
Chameleon signatures are based on well established hashand-
sign paradigm, where a chameleon hash function is used to compute
the cryptographic message digest. Chameleon signatures simultaneously
p...