Chameleon Hashing and Signatures

@article{Krawczyk1998ChameleonHA,
  title={Chameleon Hashing and Signatures},
  author={Harald Krawczyk and Tal Rabin},
  journal={IACR Cryptology ePrint Archive},
  year={1998},
  volume={1998},
  pages={10}
}
We introduce chameleon signatures that provide with an undeniable commitment of the signer to the contents of the signed document (as regular digital signatures do) but, at the same time, do not allow the recipient of the signature to disclose the contents of the signed information to any third party without the signer's consent. These signatures are closely related to \undeniable signatures", but chameleon signatures allow for simpler and more eecient realizations than the latter. In… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 87 CITATIONS, ESTIMATED 96% COVERAGE

Hash Functions from Sigma Protocols and Improvements to VSH

VIEW 10 EXCERPTS
CITES RESULTS & BACKGROUND
HIGHLY INFLUENCED

A Mechanism for Privacy-preserving Concurrent Collaborations in Distributed Environment

  • 2007
VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Addressing interoperability issues in access control models

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2003
2019

CITATION STATISTICS

  • 22 Highly Influenced Citations