Chameleon Hash Function Implementations: References
- Chameleon Hashing and Signatures
- Improved Online/Offline Singnature Schemes
- Identity-based Chameleon Hash and Applications
- On the Key Exposure Problem in Chameleon Hashes
- Chameleon Hashing without Key Exposure
- Sanitizable Signatures