Back to Results
First PageMeta Content
Hash function / SHA-1 / Lamport signature / ElGamal signature scheme / Cryptography / Digital signature / Cryptographic hash function


Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros
Add to Reading List

Document Date: 2004-03-15 18:18:40


Open Document

File Size: 166,76 KB

Share Result on Facebook

Company

B. / /

/

Event

Product Issues / Product Recall / /

IndustryTerm

non-interactive algorithm / forged-signature denial protocol / setup algorithm / non-interactive protocols / probabilistic algorithm / public algorithm / computable algorithms / deterministic algorithm / hash algorithm / escrow server / extract protocol / extraction algorithm / /

Organization

The Johns Hopkins University / /

Person

Giuseppe Ateniese Breno de Medeiros / /

Position

scheme manager / manager for the bona fide reason / judge / /

Product

α∆+βv / /

ProvinceOrState

Saskatchewan / /

Technology

encryption / extract protocol / cryptography / Forge algorithm / hash algorithm / public key / Extending Euclidean algorithm / non-interactive algorithm / non-interactive protocols / setup algorithm / deterministic algorithm / identity-based encryption / private key / efficiently computable algorithms / secret key / id-based encryption / forged-signature denial protocol / public algorithm / extraction algorithm / probabilistic algorithm / extended Euclidean algorithm / /

SocialTag