Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures
暂无分享,去创建一个
[1] Helger Lipmaa,et al. Succinct Functional Commitment for a Large Class of Arithmetic Circuits , 2020, ASIACRYPT.
[2] Giulio Malavolta,et al. Subvector Commitments with Application to Succinct Arguments , 2019, CRYPTO.
[3] Ryo Nishimaki,et al. Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions , 2019, IACR Cryptol. ePrint Arch..
[4] David J. Wu,et al. Multi-theorem Preprocessing NIZKs from Lattices , 2018, Journal of Cryptology.
[5] Markulf Kohlweiss,et al. Updatable and Universal Common Reference Strings with Applications to zk-SNARKs , 2018, IACR Cryptol. ePrint Arch..
[6] Dario Fiore,et al. On the Security Notions for Homomorphic Signatures , 2018, IACR Cryptol. ePrint Arch..
[7] Hoeteck Wee,et al. Unbounded ABE via Bilinear Entropy Expansion, Revisited , 2018, IACR Cryptol. ePrint Arch..
[8] Moti Yung,et al. Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions , 2016, ICALP.
[9] Dario Fiore,et al. Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys , 2015, CRYPTO.
[10] Daniel Wichs,et al. Leveled Fully Homomorphic Signatures from Standard Lattices , 2015, IACR Cryptol. ePrint Arch..
[11] Hoeteck Wee,et al. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings , 2015, EUROCRYPT.
[12] Dario Catalano,et al. Authenticating Computation on Groups: New Homomorphic Primitives and Applications , 2014, ASIACRYPT.
[13] Bogdan Warinschi,et al. Homomorphic Signatures with Efficient Verification for Polynomial Functions , 2014, CRYPTO.
[14] Rosario Gennaro,et al. Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..
[15] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[16] M. Yung,et al. Linearly homomorphic structure-preserving signatures and their applications , 2013, Designs, Codes and Cryptography.
[17] Craig Gentry,et al. Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..
[18] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[19] David Mandell Freeman,et al. Improved Security for Linearly Homomorphic Signatures: A Generic Framework , 2012, Public Key Cryptography.
[20] Bogdan Warinschi,et al. Efficient Network Coding Signatures in the Standard Model , 2012, Public Key Cryptography.
[21] Abhi Shelat,et al. Computing on Authenticated Data , 2012, Journal of Cryptology.
[22] Craig Gentry,et al. Separating succinct non-interactive arguments from all falsifiable assumptions , 2011, IACR Cryptol. ePrint Arch..
[23] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[24] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[25] Nuttapong Attrapadung,et al. Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.
[26] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[27] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[28] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[29] Jonathan Katz,et al. Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..
[30] Moti Yung,et al. Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs , 2010, TCC.
[31] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[32] Mario Di Raimondo,et al. Zero-Knowledge Sets With Short Proofs , 2008, IEEE Transactions on Information Theory.
[33] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[34] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[35] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[36] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[37] Chris Peikert,et al. Vector and Functional Commitments from Lattices , 2021, IACR Cryptol. ePrint Arch..
[38] Jorge Luis Villar,et al. An Algebraic Framework for Diffie–Hellman Assumptions , 2015, Journal of Cryptology.