Function-Dependent Commitments for Verifiable Multi-Party Computation
暂无分享,去创建一个
[1] Ivan Damgård,et al. Publicly Auditable Secure Multi-Party Computation , 2014, SCN.
[2] Nuttapong Attrapadung,et al. Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.
[3] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[4] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[5] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[6] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[9] Michael Backes,et al. ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data , 2015, 2015 IEEE Symposium on Security and Privacy.
[10] Berry Schoenmakers,et al. Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation , 2016, ACNS.
[11] Lucas Schabhüser,et al. A Linearly Homomorphic Signature Scheme from Weaker Assumptions , 2017, IMACC.
[12] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[13] Bogdan Warinschi,et al. Homomorphic Signatures with Efficient Verification for Polynomial Functions , 2014, CRYPTO.
[14] Steve A. Schneider,et al. A Peered Bulletin Board for Robust Use in Verifiable Voting Systems , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[15] Dario Fiore,et al. Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys , 2015, CRYPTO.
[16] Berry Schoenmakers,et al. Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems , 2015, ACNS.
[17] Moni Naor,et al. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy , 2006, CRYPTO.
[18] Rosario Gennaro,et al. Generalizing Homomorphic MACs for Arithmetic Circuits , 2014, IACR Cryptol. ePrint Arch..
[19] Jon Howell,et al. Geppetto: Versatile Verifiable Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[20] Vinod Vaikuntanathan,et al. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..
[21] Bogdan Warinschi,et al. Efficient Network Coding Signatures in the Standard Model , 2012, Public Key Cryptography.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Denise Demirel,et al. Privately and Publicly Verifiable Computing Techniques - A Survey , 2017, Springer Briefs in Computer Science.
[24] Manuel Barbosa,et al. Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation , 2012, CT-RSA.
[25] Craig Gentry,et al. Separating succinct non-interactive arguments from all falsifiable assumptions , 2011, IACR Cryptol. ePrint Arch..
[26] Reihaneh Safavi-Naini,et al. Generalized homomorphic MACs with efficient verification , 2014, ASIAPKC '14.
[27] Moti Yung,et al. Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions , 2016, ICALP.
[28] Denise Demirel,et al. An unconditionally hiding auditing procedure for computations over distributed data , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[29] David Mandell Freeman,et al. Improved Security for Linearly Homomorphic Signatures: A Generic Framework , 2012, Public Key Cryptography.
[30] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.