-
1
-
-
68849097857
-
Homomorphic MACs: MAC-based integrity for network coding
-
In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg
-
Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292–305. Springer, Heidelberg (2009)
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
77955319555
-
From secrecy to soundness: Efficient verification via secure computation
-
Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.), Springer, Heidelberg
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: Efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010, Part I. LNCS, vol. 6198, pp. 152–163. Springer, Heidelberg (2010)
-
(2010)
ICALP 2010, Part I. LNCS
, vol.6198
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
3
-
-
84921395160
-
Algorithms and Theory of Computation Handbook
-
ch. 17. CRC Press
-
Atallah, M., Blanton, M. (eds.): Algorithms and Theory of Computation Handbook. General Concepts and Techniques, vol. I, ch. 17. CRC Press (2009)
-
(2009)
General Concepts and Techniques
, vol.1
-
-
Atallah, M.1
Blanton, M.2
-
4
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: ASIACCS, pp. 48–59 (2010)
-
(2010)
ASIACCS
, pp. 48-59
-
-
Atallah, M.1
Frikken, K.2
-
5
-
-
84867646569
-
Private outsourcing of matrix multiplication over closed semi-rings
-
Atallah, M., Frikken, K., Wang, S.: Private outsourcing of matrix multiplication over closed semi-rings. In: SECRYPT, pp. 136–144 (2012)
-
(2012)
SECRYPT
, pp. 136-144
-
-
Atallah, M.1
Frikken, K.2
Wang, S.3
-
6
-
-
84862599114
-
Rational proofs
-
Azar, P.D., Micali, S.: Rational proofs. In: STOC, pp. 1017–1028 (2012)
-
(2012)
STOC
, pp. 1017-1028
-
-
Azar, P.D.1
Micali, S.2
-
7
-
-
84893334389
-
Super efficient rational proofs
-
Azar, P.D., Micali, S.: Super efficient rational proofs. In: EC, pp. 29–30 (2013)
-
(2013)
EC
, pp. 29-30
-
-
Azar, P.D.1
Micali, S.2
-
8
-
-
0021980820
-
Trading group theory for randomness
-
Babai, L.: Trading group theory for randomness. In: STOC, pp. 421–429 (1985)
-
(1985)
STOC
, pp. 421-429
-
-
Babai, L.1
-
9
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: CCS, pp. 863–874 (2013)
-
(2013)
CCS
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
10
-
-
35248851617
-
Correlation-resistant storage via keyword-searchable encryption
-
Ballard, L., Green, M., Medeiros, B., Monrose, F.: Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive 2005/417 (2005)
-
(2005)
Cryptology ePrint Archive 2005/417
-
-
Ballard, L.1
Green, M.2
Medeiros, B.3
Monrose, F.4
-
11
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
In: Kilian, J. (ed.), Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
12
-
-
50849092893
-
Dynamic group diffie-hellman key exchange under standard assumptions
-
In: Knudsen, L.R. (ed.), Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group diffie-hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002. LNCS
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
13
-
-
84873952327
-
Algebraic (trapdoor) one-way functions and their applications
-
In: Sahai, A. (ed.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680–699. Springer, Heidelberg (2013)
-
(2013)
TCC 2013. LNCS
, vol.7785
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
-
15
-
-
80051994919
-
Memory delegation
-
In: Rogaway, P. (ed.), Springer, Heidelberg
-
Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151–168. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 151-168
-
-
Chung, K.-M.1
Kalai, Y.T.2
Liu, F.-H.3
Raz, R.4
-
16
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483–501. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
17
-
-
84974555688
-
A cryptographic solution to a game theoretic problem
-
In: Bellare, M. (ed.), Springer, Heidelberg
-
Dodis, Y., Halevi, S., Rabin, T.: A cryptographic solution to a game theoretic problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 112–130. Springer, Heidelberg (2000)
-
(2000)
CRYPTO 2000. LNCS
, vol.1880
, pp. 112-130
-
-
Dodis, Y.1
Halevi, S.2
Rabin, T.3
-
18
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: CCS, pp. 501–512 (2012)
-
(2012)
CCS
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
19
-
-
84893486709
-
Rational protocol design: Cryptography against incentive-driven adversaries
-
Garay, J., Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Rational protocol design: Cryptography against incentive-driven adversaries. In: FOCS, pp. 648–657 (2013)
-
(2013)
FOCS
, pp. 648-657
-
-
Garay, J.1
Katz, J.2
Maurer, U.3
Tackmann, B.4
Zikas, V.5
-
20
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
21
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: Interactive proofs for muggles. In: STOC, pp. 113–122 (2008)
-
(2008)
STOC
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
22
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186–208 (1989)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
84893284656
-
Rational arguments: Single round delegation with sublinear verification
-
Guo, S., Hubáček, S., Rosen, A., Vald, M.: Rational arguments: Single round delegation with sublinear verification. In: ITCS, pp. 523–540 (2014)
-
(2014)
ITCS
, pp. 523-540
-
-
Guo, S.1
Hubáček, S.2
Rosen, A.3
Vald, M.4
-
24
-
-
4544259607
-
Rational secret sharing and multiparty computation: Extended abstract
-
Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: Extended abstract. In: STOC, pp. 623–632 (2004)
-
(2004)
STOC
, pp. . 623-. 632
-
-
Halpern, J.1
Teague, V.2
-
25
-
-
84944905011
-
Homomorphic signature schemes
-
In: Preneel, B. (ed.), Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
26
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments (extended abstract)
-
Kilian, J.: A note on efficient zero-knowledge proofs and arguments (extended abstract). In: STOC, pp. 723–732 (1992)
-
(1992)
STOC
, pp. 723-732
-
-
Kilian, J.1
-
27
-
-
84957654400
-
Improved efficient arguments (Preliminary version)
-
In: Coppersmith, D. (ed.), Springer, Heidelberg
-
Kilian, J.: Improved efficient arguments (Preliminary version). In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 311–324. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995. LNCS
, vol.963
, pp. 311-324
-
-
Kilian, J.1
-
28
-
-
38249013295
-
On practical algorithms for accelerated matrix mutiplication
-
Landerman, J., Pan, V., Sha, X.-H.: On practical algorithms for accelerated matrix mutiplication. Linear Algebra and Its Applications 162–164, 557–588
-
Linear Algebra and Its Applications
, vol.162-164
, pp. 557-588
-
-
Landerman, J.1
Pan, V.2
Sha, X.-H.3
-
29
-
-
0002597886
-
CS proofs
-
Micali, S.: CS proofs. In: FOCS, pp. 436–453 (1994)
-
(1994)
FOCS
, pp. 436-453
-
-
Micali, S.1
-
31
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly practical verifiable computation. In: IEEE Symposium on Security and Privacy (2013)
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Parno, B.1
Howell, J.2
Gentry, C.3
Raykova, M.4
-
32
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012)
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
33
-
-
84893690959
-
Private outsourcing of polynomial evaluation and matrixmultiplication usingmultilinear maps
-
Abdalla,M., Nita-Rotaru, C., Dahab, R. (eds.), Springer, Heidelberg
-
Zhang, L.F., Safavi-Naini, R.: Private outsourcing of polynomial evaluation and matrixmultiplication usingmultilinear maps. In: Abdalla,M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 329–348. Springer, Heidelberg (2013)
-
(2013)
CANS 2013. LNCS
, vol.8257
, pp. 329-348
-
-
Zhang, L.F.1
Safavi-Naini, R.2
-
34
-
-
84921395158
-
Efficient secure and verifiable outsourcing of matrix multiplications
-
Zhang, Y., Blanton, M.: Efficient secure and verifiable outsourcing of matrix multiplications. Cryptology ePrint Archive 2014/133 (2014)
-
(2014)
Cryptology ePrint Archive 2014/133
-
-
Zhang, Y.1
Blanton, M.2
|