The following publications are possibly variants of this publication:
- Identity-Based Chameleon Hash Scheme without Key ExposureXiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim. acisp 2010: 200-215 [doi]
- Identity-based chameleon hashing and signatures without key exposureXiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim. isci, 265:198-210, 2014. [doi]
- Chameleon Hashing Without Key ExposureXiaofeng Chen, Fangguo Zhang, Kwangjo Kim. iiswc 2004: 87-98 [doi]
- Chameleon Hashing without Key ExposureXiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim. iacr, 2004:38, 2004. [doi]
- Discrete logarithm based chameleon hashing and signatures without key exposureXiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim. cee, 37(4):614-623, 2011. [doi]
- Comments and Improvements on Chameleon Hashing Without Key Exposure Based on FactoringXiaofeng Chen 0001, Haibo Tian, Fangguo Zhang. iacr, 2009:319, 2009. [doi]
- Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on FactoringXiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding. cisc 2011: 415-426 [doi]
- Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm SystemsXiaofeng Chen 0001, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim. iacr, 2009:35, 2009. [doi]