Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
暂无分享,去创建一个
[1] John C. Mitchell,et al. Automated Analysis of Cryptographic Assumptions in Generic Group Models , 2018, Journal of Cryptology.
[2] Zhenfeng Zhang,et al. Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes , 2016, CRYPTO.
[3] Dario Fiore,et al. Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys , 2015, CRYPTO.
[4] Daniel Wichs,et al. Leveled Fully Homomorphic Signatures from Standard Lattices , 2015, IACR Cryptol. ePrint Arch..
[5] Bogdan Warinschi,et al. Homomorphic Signatures with Efficient Verification for Polynomial Functions , 2014, CRYPTO.
[6] Mehdi Tibouchi,et al. Structure-Preserving Signatures from Type II Pairings , 2014, CRYPTO.
[7] Rosario Gennaro,et al. Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..
[8] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[9] M. Yung,et al. Linearly homomorphic structure-preserving signatures and their applications , 2013, Designs, Codes and Cryptography.
[10] Kenneth G. Paterson,et al. Programmable Hash Functions in the Multilinear Setting , 2013, CRYPTO.
[11] Rosario Gennaro,et al. Algebraic (Trapdoor) One-Way Functions and Their Applications , 2013, TCC.
[12] Thomas Peters,et al. Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures , 2013, Public Key Cryptography.
[13] Thomas Peters,et al. Computing on Authenticated Data: New Privacy Definitions and Constructions , 2012, ASIACRYPT.
[14] Jacob C. N. Schuldt,et al. On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups , 2012, CRYPTO.
[15] David Mandell Freeman,et al. Improved Security for Linearly Homomorphic Signatures: A Generic Framework , 2012, Public Key Cryptography.
[16] Bogdan Warinschi,et al. Efficient Network Coding Signatures in the Standard Model , 2012, Public Key Cryptography.
[17] Abhi Shelat,et al. Computing on Authenticated Data , 2012, Journal of Cryptology.
[18] Goichiro Hanaoka,et al. Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More , 2012, CT-RSA.
[19] Tibor Jager,et al. Short Signatures From Weaker Assumptions , 2011, IACR Cryptol. ePrint Arch..
[20] Dan Boneh,et al. Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.
[21] Bogdan Warinschi,et al. Adaptive Pseudo-Free Groups and Applications , 2011, IACR Cryptol. ePrint Arch..
[22] Matthew Green,et al. Practical Adaptive Oblivious Transfer from Simple Assumptions , 2011, IACR Cryptol. ePrint Arch..
[23] Nuttapong Attrapadung,et al. Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.
[24] Dan Boneh,et al. Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.
[25] Tibor Jager,et al. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model , 2010, Public Key Cryptography.
[26] Jonathan Katz,et al. Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..
[27] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[28] Eike Kiltz,et al. Programmable Hash Functions and Their Applications , 2008, Journal of Cryptology.
[29] Brent Waters. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[30] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[31] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[32] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[33] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[34] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[35] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[36] Amit Sahai,et al. Coding Constructions for Blacklisting Problems without Computational Assumptions , 1999, CRYPTO.
[37] P. Erdös,et al. Families of finite sets in which no set is covered by the union ofr others , 1985 .
[38] Jacob T. Schwartz,et al. Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.
[39] Richard Zippel,et al. Probabilistic algorithms for sparse polynomials , 1979, EUROSAM.
[40] Elaine Shi,et al. Adaptively Secure Fully Homomorphic Signatures Based on Lattices , 2014, IACR Cryptol. ePrint Arch..