-
1
-
-
68849097857
-
Homomorphic mACs: MAC-based integrity for network coding
-
In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg
-
Agrawal, S., Boneh, D.: Homomorphic mACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009)
-
(2009)
ACNS 2009. LNCS,
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
84858316020
-
Computing on authenticated data
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1-20. Springer, Heidelberg (2012)
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 1-20
-
-
Ahn, J.H.1
Boneh, D.2
Camenisch, J.3
Hohenberger, S.4
Shelat, A.5
Waters, B.6
-
3
-
-
79952517275
-
Homomorphic network coding signatures in the standard model
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS,
, vol.6571
, pp. 17-34
-
-
Attrapadung, N.1
Libert, B.2
-
4
-
-
84871547968
-
Computing on authenticated data: New privacy definitions and constructions
-
In: Wang, X., Sako, K. (eds.), Springer, Heidelberg
-
Attrapadung, N., Libert, B., Peters, T.: Computing on authenticated data: New privacy definitions and constructions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 367-385. Springer, Heidelberg (2012)
-
(2012)
ASIACRYPT 2012. LNCS,
, vol.7658
, pp. 367-385
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
5
-
-
84873972598
-
Efficient completely context-hiding quotable and linearly homomorphic signatures
-
In: Kurosawa, K., Hanaoka, G. (eds.), Springer, Heidelberg
-
Attrapadung, N., Libert, B., Peters, T.: Efficient completely context-hiding quotable and linearly homomorphic signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 386-404. Springer, Heidelberg (2013)
-
(2013)
PKC 2013. LNCS
, vol.7778
, pp. 386-404
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
6
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.), ACM Press (November 2013)
-
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 863-874. ACM Press (November 2013)
-
ACM CCS 2013
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
7
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
Goldwasser, S. (ed.), ACM (January 2012)
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Goldwasser, S. (ed.) ITCS 2012, pp. 326-349. ACM (January 2012)
-
ITCS 2012
, pp. 326-349
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
8
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
In: Jarecki, S., Tsudik, G. (eds.), Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
9
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 149-168. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.M.2
-
10
-
-
79952503806
-
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1-16. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 1-16
-
-
Boneh, D.1
Freeman, D.M.2
-
11
-
-
84883564164
-
Practical homomorphic mACs for arithmetic circuits
-
In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
-
Catalano, D., Fiore, D.: Practical homomorphic mACs for arithmetic circuits. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 336-352. Springer, Heidelberg (2013)
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 336-352
-
-
Catalano, D.1
Fiore, D.2
-
12
-
-
84958524125
-
Generalizing homomorphic mACs for arithmetic circuits
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Nizzardo, L.: Generalizing homomorphic mACs for arithmetic circuits. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 538-555. Springer, Heidelberg (2014)
-
(2014)
PKC 2014. LNCS
, vol.8383
, pp. 538-555
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Nizzardo, L.4
-
13
-
-
84873952327
-
Algebraic (Trapdoor) one-way functions and their applications
-
In: Sahai, A. (ed.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013)
-
(2013)
TCC 2013. LNCS
, vol.7785
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
-
14
-
-
79958003300
-
Adaptive pseudo-free groups and applications
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 207-223
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
15
-
-
84861674721
-
Efficient network coding signatures in the standard model
-
In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012)
-
(2012)
PKC 2012. LNCS,
, vol.7293
, pp. 680-696
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
16
-
-
84905409138
-
Homomorphic signatures with efficient verification for polynomial functions
-
In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Homomorphic signatures with efficient verification for polynomial functions. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 371-389. Springer, Heidelberg (2014)
-
(2014)
CRYPTO 2014, Part I. LNCS
, vol.8616
, pp. 371-389
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
17
-
-
84916212282
-
Computer security by redefining what a computer is
-
Desmedt, Y.: Computer security by redefining what a computer is. In: NSPW (1993)
-
(1993)
NSPW
-
-
Desmedt, Y.1
-
18
-
-
85028450627
-
Non-malleable cryptography (Extended abstract)
-
ACM Press (May 1991)
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: 23rd ACM STOC, pp. 542-552. ACM Press (May 1991)
-
23Rd ACM STOC
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
19
-
-
84861691857
-
Improved security for linearly homomorphic signatures: A generic framework
-
In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
-
Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012)
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 697-714
-
-
Freeman, D.M.1
-
20
-
-
35248886595
-
Strengthening zero-knowledge protocols using signatures
-
In: Biham, E. (ed.), Springer, Heidelberg
-
Garay, J.A., MacKenzie, P.D., Yang, K.: Strengthening zero-knowledge protocols using signatures. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 177-194. Springer, Heidelberg (2003)
-
(2003)
EUROCRYPT 2003. LNCS
, vol.2656
, pp. 177-194
-
-
Garay, J.A.1
Mackenzie, P.D.2
Yang, K.3
-
21
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
22
-
-
78649897589
-
Secure network coding over the integers
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
84892393413
-
Fully homomorphic message authenticators
-
In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
-
Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 301-320. Springer, Heidelberg (2013)
-
(2013)
ASIACRYPT 2013, Part II. LNCS
, vol.8270
, pp. 301-320
-
-
Gennaro, R.1
Wichs, D.2
-
24
-
-
79959724747
-
Separating succinct non-interactive arguments from all falsifiable assumptions
-
Fortnow, L., Vadhan, S.P. (eds.), Press (June 2011)
-
Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: Fortnow, L., Vadhan, S.P. (eds.) 43rd ACM STOC, pp. 99-108. ACM Press (June 2011)
-
43Rd ACM STOC
, pp. 99-108
-
-
Gentry, C.1
Wichs, D.2
-
25
-
-
78650812215
-
Short pairing-based non-interactive zero-knowledge arguments
-
In: Abe, M. (ed.), Springer, Heidelberg
-
Groth, J.: Short pairing-based non-interactive zero-knowledge arguments. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 321-340. Springer, Heidelberg (2010)
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 321-340
-
-
Groth, J.1
-
26
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
In: Smart, (ed.), Springer, Heidelberg
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008. LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
27
-
-
84944905011
-
Homomorphic signature schemes
-
In: Preneel, B. (ed.), Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.X.3
Wagner, D.4
-
28
-
-
84884496249
-
Linearly homomorphic structurepreserving signatures and their applications
-
In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Libert, B., Peters, T., Joye, M., Yung, M.: Linearly homomorphic structurepreserving signatures and their applications. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 289-307. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part II. LNCS
, vol.8043
, pp. 289-307
-
-
Libert, B.1
Peters, T.2
Joye, M.3
Yung, M.4
-
29
-
-
0002597886
-
CS proofs (Extended abstracts)
-
IEEE Computer Society Press (November 1994)
-
Micali, S.: CS proofs (extended abstracts). In: 35th FOCS, pp. 436-453. IEEE Computer Society Press (November 1994)
-
35Th FOCS
, pp. 436-453
-
-
Micali, S.1
-
30
-
-
84944878224
-
Transitive signature schemes
-
In: Preneel, B. (ed.), Springer, Heidelberg
-
Micali, S., Rivest, R.L.: Transitive signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 236-243. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
31
-
-
84992493441
-
Directed transitive signature scheme
-
In: Abe, M. (ed.), Springer, Heidelberg
-
Yi, X.: Directed transitive signature scheme. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 129-144. Springer, Heidelberg (2006)
-
(2006)
CT-RSA 2007. LNCS,
, vol.4377
, pp. 129-144
-
-
Yi, X.1
|