-
1
-
-
68849097857
-
MACs: MAC-based integrity for network coding
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Agrawal, S., Boneh, D.: MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
84858316020
-
Computing on authenticated data
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1-20. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 1-20
-
-
Ahn, J.H.1
Boneh, D.2
Camenisch, J.3
Hohenberger, S.4
Shelat, A.5
Waters, B.6
-
3
-
-
77955319555
-
From secrecy to soundness: Efficient verification via secure computation
-
Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010, Part I. Springer, Heidelberg
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010, Part I. LNCS, vol. 6198, pp. 152-163. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6198
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
4
-
-
79952517275
-
Homomorphic network coding signatures in the standard model
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 17-34
-
-
Attrapadung, N.1
Libert, B.2
-
5
-
-
84871547968
-
Computing on authenticated data: New privacy definitions and constructions
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
-
Attrapadung, N., Libert, B., Peters, T.: Computing on authenticated data: New privacy definitions and constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 367-385. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7658
, pp. 367-385
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
6
-
-
84873972598
-
Efficient completely context-hiding quotable and linearly homomorphic signatures
-
Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. Springer, Heidelberg
-
Attrapadung, N., Libert, B., Peters, T.: Efficient completely context-hiding quotable and linearly homomorphic signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 386-404. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7778
, pp. 386-404
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
7
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
8
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: ITCS 2012: Proceedings of the 3rd Symposium on Innovations in Theoretical Computer Science (2012)
-
ITCS 2012: Proceedings of the 3rd Symposium on Innovations in Theoretical Computer Science (2012)
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
9
-
-
84862632560
-
Recursive composition and boot-strapping for snarks and proof-carrying data
-
Report 2012/095
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and boot-strapping for snarks and proof-carrying data. Cryptology ePrint Archive, Report 2012/095 (2012), http://eprint.iacr.org
-
(2012)
Cryptology ePrint Archive
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
10
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
11
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp./del 149-168. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
-
-
Boneh, D.1
Freeman, D.M.2
-
12
-
-
79952503806
-
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures.In:Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1-16. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 1-16
-
-
Boneh, D.1
Freeman, D.M.2
-
13
-
-
52149104493
-
The uber-assumption family: A unified complexity framework for bilinear groups
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
-
Boyen, X.: The uber-assumption family: A unified complexity framework for bilinear groups. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5209
, pp. 39-56
-
-
Boyen, X.1
-
14
-
-
84873952327
-
Algebraic (trapdoor) one way functions and their applications
-
Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
-
15
-
-
79958003300
-
Adaptive pseudo-free groups and applications
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 207-223
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
16
-
-
84861674721
-
Efficient network coding signatures in the standard model
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 680-696
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
17
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
18
-
-
80051994919
-
Memory delegation
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 151-168
-
-
Chung, K.-M.1
Kalai, Y.T.2
Liu, F.-H.3
Raz, R.4
-
19
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
ACM Press October Full version avaiable at
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: 2012 ACM Conference on Computer and Communication Security. ACM Press (October 2012) Full version avaiable at, http://eprint.iacr.org/2012/281
-
(2012)
2012 ACM Conference on Computer and Communication Security
-
-
Fiore, D.1
Gennaro, R.2
-
20
-
-
84861691857
-
Improved security for linearly homomorphic signatures: A generic framework
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 697-714
-
-
Freeman, D.M.1
-
21
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
22
-
-
78649897589
-
Secure network coding over the integers
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
84873362452
-
Fully homomorphic message authenticators
-
Report 2012/290
-
Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. Cryptology ePrint Archive, Report 2012/290 (2012), http://eprint.iacr.org
-
(2012)
Cryptology ePrint Archive
-
-
Gennaro, R.1
Wichs, D.2
-
24
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices. Mitzenmacher, M. (ed.)
-
ACM Press
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC, Bethesda, Maryland, USA, May 31-June2, pp. 169-178. ACM Press (2009)
-
(2009)
41st ACM STOC, Bethesda, Maryland, USA, May 31-June2, 169-178
-
-
Gentry, C.1
-
25
-
-
79959724747
-
Separating succinct non-interactive arguments from all falsifiable assumptions. Fortnow, L., Vadhan, S.P. (eds.)
-
ACM Press
-
Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: Fortnow, L., Vadhan, S.P. (eds.) 43rd ACM STOC, San Jose, California, USA, June 6-8, pp. 99-108. ACM Press (2011)
-
(2011)
43rd ACM STOC, San Jose, California, USA, June 6-8, 99-108.
-
-
Gentry, C.1
Wichs, D.2
-
26
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles. Ladner, R.E., Dwork, C. (eds.)
-
ACM Press
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, Victoria, British Columbia, Canada, May 17-20, pp. 113-122. ACM Press (2008)
-
(2008)
40th ACM STOC, Victoria, British Columbia, Canada, May 17-20
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
27
-
-
84944905011
-
Homomorphic signature schemes
-
Preneel, B. (ed.) CT-RSA 2002. Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
28
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
ACM Press
-
Kilian, J.: A note on efficient zero-knowledge proofs and arguments. In: 24th ACM STOC, Victoria, British Columbia, Canada, May 4-6, pp. 723-732. ACM Press (1992)
-
(1992)
24th ACM STOC, Victoria, British Columbia, Canada, May 4-6, 723-732.
-
-
Kilian, J.1
-
30
-
-
0036475666
-
A new traitor tracing
-
Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Transactions on Fundamentals E85-A(2), 481-484 (2002)
-
(2002)
IEICE Transactions on Fundamentals
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
31
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
32
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
34
-
-
40249118374
-
Incrementally verifiable computation or proofs of knowledge imply time/Space efficiency
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Valiant, P.: Incrementally verifiable computation or proofs of knowledge imply time/Space efficiency. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 1-18. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 1-18
-
-
Valiant, P.1
|