-
1
-
-
68849097857
-
Homomorphic mACs: MAC-based integrity for network coding
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Agrawal, S., Boneh, D.: Homomorphic mACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
79952517275
-
Homomorphic network coding signatures in the standard model
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 17-34
-
-
Attrapadung, N.1
Libert, B.2
-
3
-
-
84871547968
-
Computing on authenticated data: New privacy definitions and constructions
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
-
Attrapadung, N., Libert, B., Peters, T.: Computing on authenticated data: New privacy definitions and constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 367-385. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7658
, pp. 367-385
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
4
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM Press November
-
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 863-874. ACM Press (November 2013)
-
(2013)
ACM CCS 2013
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
5
-
-
84905384404
-
Automated analysis of cryptographic assumptions in generic group models
-
Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. Springer, Heidelberg
-
Barthe, G., Fagerholm, E., Fiore, D., Mitchell, J., Scedrov, A., Schmidt, B.: Automated analysis of cryptographic assumptions in generic group models. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 95-112. Springer, Heidelberg (2014)
-
(2014)
LNCS
, vol.8616
, pp. 95-112
-
-
Barthe, G.1
Fagerholm, E.2
Fiore, D.3
Mitchell, J.4
Scedrov, A.5
Schmidt, B.6
-
6
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
7
-
-
84879803522
-
Recursive composition and bootstrapping for SNARKS and proof-carrying data
-
Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) ACM Press June
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and bootstrapping for SNARKS and proof-carrying data. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) 45th ACM STOC, pp. 111-120. ACM Press (June 2013)
-
(2013)
45th ACM STOC
, pp. 111-120
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
8
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
9
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 149-168. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.M.2
-
10
-
-
84883564164
-
Practical homomorphic mACs for arithmetic circuits
-
Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
-
Catalano, D., Fiore, D.: Practical homomorphic mACs for arithmetic circuits. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 336-352. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7881
, pp. 336-352
-
-
Catalano, D.1
Fiore, D.2
-
11
-
-
84958524125
-
Generalizing homomorphic mACs for arithmetic circuits
-
Krawczyk, H. (ed.) PKC 2014. Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Nizzardo, L.: Generalizing homomorphic mACs for arithmetic circuits. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 538-555. Springer, Heidelberg (2014)
-
(2014)
LNCS
, vol.8383
, pp. 538-555
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Nizzardo, L.4
-
12
-
-
84873952327
-
Algebraic (trapdoor) one-way functions and their applications
-
Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
-
13
-
-
79958003300
-
Adaptive pseudo-free groups and applications
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 207-223
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
14
-
-
84861674721
-
Efficient network coding signatures in the standard model
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 680-696
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
15
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Chung, K.-M., Kalai, Y., Vadhan, S.P.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.P.3
-
16
-
-
80051994919
-
Memory delegation
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 151-168
-
-
Chung, K.-M.1
Kalai, Y.T.2
Liu, F.-H.3
Raz, R.4
-
17
-
-
84884473382
-
Practical multilinear maps over the integers
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
-
Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8042
, pp. 476-493
-
-
Coron, J.-S.1
Lepoint, T.2
Tibouchi, M.3
-
18
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Press October
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, pp. 501-512. ACM Press (October 2012)
-
(2012)
ACM CCS 2012
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
19
-
-
84861691857
-
Improved security for linearly homomorphic signatures: A generic framework
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 697-714
-
-
Freeman, D.M.1
-
20
-
-
84879875394
-
Candidate multilinear maps from ideal lattices
-
Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7881
, pp. 1-17
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
-
21
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
22
-
-
84883413063
-
Quadratic span programs and succinct nIZKs without pCPs
-
Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B., Raykova, M.: Quadratic span programs and succinct nIZKs without pCPs. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 626-645. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7881
, pp. 626-645
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
Raykova, M.4
-
23
-
-
78649897589
-
Secure network coding over the integers
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
24
-
-
84892393413
-
Fully homomorphic message authenticators
-
Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. Springer, Heidelberg
-
Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 301-320. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8270
, pp. 301-320
-
-
Gennaro, R.1
Wichs, D.2
-
25
-
-
84995435668
-
GGHLite: More efficient multilinear maps from ideal lattices
-
Springer, Heidelberg
-
Langlois, A., Stehle, D., Steinfeld, R.: GGHLite: More efficient multilinear maps from ideal lattices. In: Advances in Cryptology - Eurocrypt 2014, Springer, Heidelberg (2014)
-
(2014)
Advances in Cryptology - Eurocrypt 2014
-
-
Langlois, A.1
Stehle, D.2
Steinfeld, R.3
-
26
-
-
0034854953
-
Computationally sound proofs
-
Micali, S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253-1298 (2000)
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
27
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
|