메뉴 건너뛰기




Volumn 7881 LNCS, Issue , 2013, Pages 336-352

Practical homomorphic MACs for arithmetic circuits

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY COMPOSITIONS; ARITHMETIC CIRCUIT; FIRST CONSTRUCTIONS; FULLY HOMOMORPHIC ENCRYPTION; HOMOMORPHIC MACS; NEW CONSTRUCTIONS; ONE-WAY FUNCTIONS; SECRET KEY;

EID: 84883564164     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38348-9_21     Document Type: Conference Paper
Times cited : (83)

References (34)
  • 1
    • 68849097857 scopus 로고    scopus 로고
    • MACs: MAC-based integrity for network coding
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
    • Agrawal, S., Boneh, D.: MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 292-305
    • Agrawal, S.1    Boneh, D.2
  • 2
    • 84858316020 scopus 로고    scopus 로고
    • Computing on authenticated data
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1-20. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 1-20
    • Ahn, J.H.1    Boneh, D.2    Camenisch, J.3    Hohenberger, S.4    Shelat, A.5    Waters, B.6
  • 3
    • 77955319555 scopus 로고    scopus 로고
    • From secrecy to soundness: Efficient verification via secure computation
    • Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010, Part I. Springer, Heidelberg
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010, Part I. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6198 , pp. 152-163
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 4
    • 79952517275 scopus 로고    scopus 로고
    • Homomorphic network coding signatures in the standard model
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 17-34
    • Attrapadung, N.1    Libert, B.2
  • 5
    • 84871547968 scopus 로고    scopus 로고
    • Computing on authenticated data: New privacy definitions and constructions
    • Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
    • Attrapadung, N., Libert, B., Peters, T.: Computing on authenticated data: New privacy definitions and constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 367-385. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7658 , pp. 367-385
    • Attrapadung, N.1    Libert, B.2    Peters, T.3
  • 6
    • 84873972598 scopus 로고    scopus 로고
    • Efficient completely context-hiding quotable and linearly homomorphic signatures
    • Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. Springer, Heidelberg
    • Attrapadung, N., Libert, B., Peters, T.: Efficient completely context-hiding quotable and linearly homomorphic signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 386-404. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7778 , pp. 386-404
    • Attrapadung, N.1    Libert, B.2    Peters, T.3
  • 7
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 9
    • 84862632560 scopus 로고    scopus 로고
    • Recursive composition and boot-strapping for snarks and proof-carrying data
    • Report 2012/095
    • Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and boot-strapping for snarks and proof-carrying data. Cryptology ePrint Archive, Report 2012/095 (2012), http://eprint.iacr.org
    • (2012) Cryptology ePrint Archive
    • Bitansky, N.1    Canetti, R.2    Chiesa, A.3    Tromer, E.4
  • 10
    • 67049095592 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 68-87
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 11
    • 79958003537 scopus 로고    scopus 로고
    • Homomorphic signatures for polynomial functions
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp./del 149-168. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632
    • Boneh, D.1    Freeman, D.M.2
  • 12
    • 79952503806 scopus 로고    scopus 로고
    • Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures.In:Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1-16. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 1-16
    • Boneh, D.1    Freeman, D.M.2
  • 13
    • 52149104493 scopus 로고    scopus 로고
    • The uber-assumption family: A unified complexity framework for bilinear groups
    • Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
    • Boyen, X.: The uber-assumption family: A unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5209 , pp. 39-56
    • Boyen, X.1
  • 14
    • 84873952327 scopus 로고    scopus 로고
    • Algebraic (trapdoor) one way functions and their applications
    • Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
    • Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 680-699
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Vamvourellis, K.4
  • 15
    • 79958003300 scopus 로고    scopus 로고
    • Adaptive pseudo-free groups and applications
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 207-223
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 16
    • 84861674721 scopus 로고    scopus 로고
    • Efficient network coding signatures in the standard model
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 680-696
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 17
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 18
    • 80051994919 scopus 로고    scopus 로고
    • Memory delegation
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 151-168
    • Chung, K.-M.1    Kalai, Y.T.2    Liu, F.-H.3    Raz, R.4
  • 19
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • ACM Press October Full version avaiable at
    • Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: 2012 ACM Conference on Computer and Communication Security. ACM Press (October 2012) Full version avaiable at, http://eprint.iacr.org/2012/281
    • (2012) 2012 ACM Conference on Computer and Communication Security
    • Fiore, D.1    Gennaro, R.2
  • 20
    • 84861691857 scopus 로고    scopus 로고
    • Improved security for linearly homomorphic signatures: A generic framework
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 697-714
    • Freeman, D.M.1
  • 21
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 22
    • 78649897589 scopus 로고    scopus 로고
    • Secure network coding over the integers
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 142-160
    • Gennaro, R.1    Katz, J.2    Krawczyk, H.3    Rabin, T.4
  • 23
    • 84873362452 scopus 로고    scopus 로고
    • Fully homomorphic message authenticators
    • Report 2012/290
    • Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. Cryptology ePrint Archive, Report 2012/290 (2012), http://eprint.iacr.org
    • (2012) Cryptology ePrint Archive
    • Gennaro, R.1    Wichs, D.2
  • 25
    • 79959724747 scopus 로고    scopus 로고
    • Separating succinct non-interactive arguments from all falsifiable assumptions. Fortnow, L., Vadhan, S.P. (eds.)
    • ACM Press
    • Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: Fortnow, L., Vadhan, S.P. (eds.) 43rd ACM STOC, San Jose, California, USA, June 6-8, pp. 99-108. ACM Press (2011)
    • (2011) 43rd ACM STOC, San Jose, California, USA, June 6-8, 99-108.
    • Gentry, C.1    Wichs, D.2
  • 27
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Preneel, B. (ed.) CT-RSA 2002. Springer, Heidelberg
    • Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 31
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 32
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 34
    • 40249118374 scopus 로고    scopus 로고
    • Incrementally verifiable computation or proofs of knowledge imply time/Space efficiency
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Valiant, P.: Incrementally verifiable computation or proofs of knowledge imply time/Space efficiency. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 1-18. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 1-18
    • Valiant, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.