메뉴 건너뛰기




Volumn 8616 LNCS, Issue PART 1, 2014, Pages 371-389

Homomorphic signatures with efficient verification for polynomial functions

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; C (PROGRAMMING LANGUAGE); CRYPTOGRAPHY; FUNCTIONS;

EID: 84905409138     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44371-2_21     Document Type: Conference Paper
Times cited : (84)

References (27)
  • 1
    • 68849097857 scopus 로고    scopus 로고
    • Homomorphic mACs: MAC-based integrity for network coding
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
    • Agrawal, S., Boneh, D.: Homomorphic mACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 292-305
    • Agrawal, S.1    Boneh, D.2
  • 2
    • 79952517275 scopus 로고    scopus 로고
    • Homomorphic network coding signatures in the standard model
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 17-34
    • Attrapadung, N.1    Libert, B.2
  • 3
    • 84871547968 scopus 로고    scopus 로고
    • Computing on authenticated data: New privacy definitions and constructions
    • Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
    • Attrapadung, N., Libert, B., Peters, T.: Computing on authenticated data: New privacy definitions and constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 367-385. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7658 , pp. 367-385
    • Attrapadung, N.1    Libert, B.2    Peters, T.3
  • 4
    • 84889045277 scopus 로고    scopus 로고
    • Verifiable delegation of computation on outsourced data
    • Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM Press November
    • Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 863-874. ACM Press (November 2013)
    • (2013) ACM CCS 2013 , pp. 863-874
    • Backes, M.1    Fiore, D.2    Reischuk, R.M.3
  • 5
    • 84905384404 scopus 로고    scopus 로고
    • Automated analysis of cryptographic assumptions in generic group models
    • Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. Springer, Heidelberg
    • Barthe, G., Fagerholm, E., Fiore, D., Mitchell, J., Scedrov, A., Schmidt, B.: Automated analysis of cryptographic assumptions in generic group models. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 95-112. Springer, Heidelberg (2014)
    • (2014) LNCS , vol.8616 , pp. 95-112
    • Barthe, G.1    Fagerholm, E.2    Fiore, D.3    Mitchell, J.4    Scedrov, A.5    Schmidt, B.6
  • 6
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 7
    • 84879803522 scopus 로고    scopus 로고
    • Recursive composition and bootstrapping for SNARKS and proof-carrying data
    • Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) ACM Press June
    • Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and bootstrapping for SNARKS and proof-carrying data. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) 45th ACM STOC, pp. 111-120. ACM Press (June 2013)
    • (2013) 45th ACM STOC , pp. 111-120
    • Bitansky, N.1    Canetti, R.2    Chiesa, A.3    Tromer, E.4
  • 8
    • 67049095592 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 68-87
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 9
    • 79958003537 scopus 로고    scopus 로고
    • Homomorphic signatures for polynomial functions
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 149-168. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 149-168
    • Boneh, D.1    Freeman, D.M.2
  • 10
    • 84883564164 scopus 로고    scopus 로고
    • Practical homomorphic mACs for arithmetic circuits
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Catalano, D., Fiore, D.: Practical homomorphic mACs for arithmetic circuits. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 336-352. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 336-352
    • Catalano, D.1    Fiore, D.2
  • 11
    • 84958524125 scopus 로고    scopus 로고
    • Generalizing homomorphic mACs for arithmetic circuits
    • Krawczyk, H. (ed.) PKC 2014. Springer, Heidelberg
    • Catalano, D., Fiore, D., Gennaro, R., Nizzardo, L.: Generalizing homomorphic mACs for arithmetic circuits. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 538-555. Springer, Heidelberg (2014)
    • (2014) LNCS , vol.8383 , pp. 538-555
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Nizzardo, L.4
  • 12
    • 84873952327 scopus 로고    scopus 로고
    • Algebraic (trapdoor) one-way functions and their applications
    • Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
    • Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 680-699
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Vamvourellis, K.4
  • 13
    • 79958003300 scopus 로고    scopus 로고
    • Adaptive pseudo-free groups and applications
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 207-223
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 14
    • 84861674721 scopus 로고    scopus 로고
    • Efficient network coding signatures in the standard model
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 680-696
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 15
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Chung, K.-M., Kalai, Y., Vadhan, S.P.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.P.3
  • 16
    • 80051994919 scopus 로고    scopus 로고
    • Memory delegation
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 151-168
    • Chung, K.-M.1    Kalai, Y.T.2    Liu, F.-H.3    Raz, R.4
  • 17
    • 84884473382 scopus 로고    scopus 로고
    • Practical multilinear maps over the integers
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
    • Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8042 , pp. 476-493
    • Coron, J.-S.1    Lepoint, T.2    Tibouchi, M.3
  • 18
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations, with applications
    • Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Press October
    • Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, pp. 501-512. ACM Press (October 2012)
    • (2012) ACM CCS 2012 , pp. 501-512
    • Fiore, D.1    Gennaro, R.2
  • 19
    • 84861691857 scopus 로고    scopus 로고
    • Improved security for linearly homomorphic signatures: A generic framework
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 697-714
    • Freeman, D.M.1
  • 20
    • 84879875394 scopus 로고    scopus 로고
    • Candidate multilinear maps from ideal lattices
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 1-17
    • Garg, S.1    Gentry, C.2    Halevi, S.3
  • 21
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 22
    • 84883413063 scopus 로고    scopus 로고
    • Quadratic span programs and succinct nIZKs without pCPs
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B., Raykova, M.: Quadratic span programs and succinct nIZKs without pCPs. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 626-645. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 626-645
    • Gennaro, R.1    Gentry, C.2    Parno, B.3    Raykova, M.4
  • 23
    • 78649897589 scopus 로고    scopus 로고
    • Secure network coding over the integers
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 142-160
    • Gennaro, R.1    Katz, J.2    Krawczyk, H.3    Rabin, T.4
  • 24
    • 84892393413 scopus 로고    scopus 로고
    • Fully homomorphic message authenticators
    • Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. Springer, Heidelberg
    • Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 301-320. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8270 , pp. 301-320
    • Gennaro, R.1    Wichs, D.2
  • 26
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • Micali, S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253-1298 (2000)
    • (2000) SIAM J. Comput. , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 27
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.