Chameleon Hash Function Implementations: References

  1. Chameleon Hashing and Signatures
  2. Improved Online/Offline Singnature Schemes
  3. Identity-based Chameleon Hash and Applications
  4. On the Key Exposure Problem in Chameleon Hashes
  5. Chameleon Hashing without Key Exposure
  6. Sanitizable Signatures