{"id":"https://openalex.org/W2107912502","doi":"https://doi.org/10.1007/978-3-662-46447-2_12","title":"Tightly-Secure Signatures from Chameleon Hash Functions","display_name":"Tightly-Secure Signatures from Chameleon Hash Functions","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2107912502","doi":"https://doi.org/10.1007/978-3-662-46447-2_12","mag":"2107912502"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-46447-2_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-662-46447-2_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprint.iacr.org/2014/1021.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015567963","display_name":"Olivier Blazy","orcid":"https://orcid.org/0000-0001-6205-8249"},"institutions":[{"id":"https://openalex.org/I65806277","display_name":"Universit\u00e9 de Limoges","ror":"https://ror.org/02cp04407","country_code":"FR","type":"education","lineage":["https://openalex.org/I65806277"]},{"id":"https://openalex.org/I4210093397","display_name":"XLIM","ror":"https://ror.org/00f7srh09","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I32881790","https://openalex.org/I4210093397","https://openalex.org/I4210095849","https://openalex.org/I65806277"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Olivier Blazy","raw_affiliation_strings":["XLim, Universit\u00e9 de Limoges, Limoges, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"XLim, Universit\u00e9 de Limoges, Limoges, France","institution_ids":["https://openalex.org/I4210093397","https://openalex.org/I65806277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090031971","display_name":"Saqib A. Kakvi","orcid":"https://orcid.org/0000-0003-4425-4240"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Saqib A. Kakvi","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security and Faculty of Mathematics, Ruhr-University Bochum, Bochum, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security and Faculty of Mathematics, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002016815","display_name":"Eike Kiltz","orcid":"https://orcid.org/0000-0003-1178-048X"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Eike Kiltz","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security and Faculty of Mathematics, Ruhr-University Bochum, Bochum, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security and Faculty of Mathematics, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005999583","display_name":"Jiaxin Pan","orcid":"https://orcid.org/0000-0002-7459-6850"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jiaxin Pan","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security and Faculty of Mathematics, Ruhr-University Bochum, Bochum, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security and Faculty of Mathematics, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015567963"],"corresponding_institution_ids":["https://openalex.org/I4210093397","https://openalex.org/I65806277"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":7.1622,"has_fulltext":true,"cited_by_count":61,"citation_normalized_percentile":{"value":0.97540123,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"256","last_page":"279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8363998532295227},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7426792979240417},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7291375994682312},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5572435259819031},{"id":"https://openalex.org/keywords/standard-model","display_name":"Standard Model (mathematical formulation)","score":0.5338125824928284},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5223782658576965},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.5028707385063171},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.4916101098060608},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4858345687389374},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.4722168743610382},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.4407769441604614},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.42183929681777954},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41999080777168274},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3789992332458496},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2351396083831787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20469671487808228},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.13380137085914612}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8363998532295227},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426792979240417},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7291375994682312},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5572435259819031},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.5338125824928284},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5223782658576965},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.5028707385063171},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.4916101098060608},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4858345687389374},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.4722168743610382},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.4407769441604614},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.42183929681777954},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41999080777168274},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3789992332458496},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2351396083831787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20469671487808228},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.13380137085914612},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C40976572","wikidata":"https://www.wikidata.org/wiki/Q2330873","display_name":"Gauge (firearms)","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-662-46447-2_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-662-46447-2_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/21bac79d-9811-41f1-8693-acb8ecb2b83e","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/21bac79d-9811-41f1-8693-acb8ecb2b83e","pdf_url":"http://eprint.iacr.org/2014/1021.pdf","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:research-information.bris.ac.uk:publications/21bac79d-9811-41f1-8693-acb8ecb2b83e","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/21bac79d-9811-41f1-8693-acb8ecb2b83e","pdf_url":"http://eprint.iacr.org/2014/1021.pdf","source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Blazy, O, Kakvi, S A, Kiltz, E & Pan, J 2015, Tightly-secure signatures from Chameleon Hash Functions. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 9020, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9020, Springer Verlag, pp. 256-279. https://doi.org/10.1007/978-3-662-46447-2_12","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:HAL:hal-02307149v1","is_oa":false,"landing_page_url":"https://hal.science/hal-02307149","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:publications/21bac79d-9811-41f1-8693-acb8ecb2b83e","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/21bac79d-9811-41f1-8693-acb8ecb2b83e","pdf_url":"http://eprint.iacr.org/2014/1021.pdf","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320308269","display_name":"Alexander von Humboldt-Stiftung","ror":"https://ror.org/012kf4317"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2107912502.pdf","grobid_xml":"https://content.openalex.org/works/W2107912502.grobid-xml"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W74973629","https://openalex.org/W125097325","https://openalex.org/W132244987","https://openalex.org/W148801026","https://openalex.org/W1499733894","https://openalex.org/W1499766499","https://openalex.org/W1512372863","https://openalex.org/W1513535488","https://openalex.org/W1524587198","https://openalex.org/W1527414074","https://openalex.org/W1529156313","https://openalex.org/W1530143568","https://openalex.org/W1538893382","https://openalex.org/W1546167911","https://openalex.org/W1548963432","https://openalex.org/W1557610876","https://openalex.org/W1558807623","https://openalex.org/W1559365371","https://openalex.org/W1566345534","https://openalex.org/W1583755810","https://openalex.org/W1592092778","https://openalex.org/W1718722133","https://openalex.org/W1826672334","https://openalex.org/W1893433466","https://openalex.org/W1925603120","https://openalex.org/W1972792640","https://openalex.org/W1994790157","https://openalex.org/W2002930326","https://openalex.org/W2012986054","https://openalex.org/W2013689473","https://openalex.org/W2022454396","https://openalex.org/W2038761522","https://openalex.org/W2044186952","https://openalex.org/W2052267638","https://openalex.org/W2057636642","https://openalex.org/W2073210531","https://openalex.org/W2074594718","https://openalex.org/W2078590992","https://openalex.org/W2078739299","https://openalex.org/W2104803737","https://openalex.org/W2107912502","https://openalex.org/W2114664664","https://openalex.org/W2117797270","https://openalex.org/W2138805158","https://openalex.org/W2141395382","https://openalex.org/W2141776264","https://openalex.org/W2142380786","https://openalex.org/W2145301648","https://openalex.org/W2146673169","https://openalex.org/W2148509425","https://openalex.org/W2151413173","https://openalex.org/W2162653919","https://openalex.org/W2165549155","https://openalex.org/W2166403741","https://openalex.org/W2172174332","https://openalex.org/W2232997092","https://openalex.org/W2394843291","https://openalex.org/W2404371125","https://openalex.org/W2561675875","https://openalex.org/W2799007907","https://openalex.org/W2948579237","https://openalex.org/W3028797682","https://openalex.org/W3193898758","https://openalex.org/W4231669165","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W140041957","https://openalex.org/W2949198936","https://openalex.org/W2401117144","https://openalex.org/W4311916128","https://openalex.org/W2405468747","https://openalex.org/W2292604118","https://openalex.org/W2352317746","https://openalex.org/W2407307802","https://openalex.org/W1652538318","https://openalex.org/W2407614215"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2016-06-24T00:00:00"}
