Tightly-secure signatures from Chameleon Hash Functions

Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationPublic-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
EditorsJonathan Katz
PublisherSpringer-Verlag
Pages256-279
Number of pages24
ISBN (Electronic)9783662464465
DOIs
Publication statusPublished - 17 Mar 2015
Event18th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2015 - Gaithersburg, United States
Duration: 30 Mar 20151 Apr 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9020
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2015
Country/TerritoryUnited States
CityGaithersburg
Period30/03/151/04/15

Keywords

  • Chameleon hash
  • Signature
  • Standard model
  • Tight reduction

Cite this