-
1
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
79952517275
-
Homomorphic network coding signatures in the standard model
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17–34. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 17-34
-
-
Attrapadung, N.1
Libert, B.2
-
3
-
-
0009011118
-
Bounded-width polynomial-size branching programs recognize exactly those languages in NC1
-
ACM
-
Barrington, D.A.M.: Bounded-width polynomial-size branching programs recognize exactly those languages in NC1. In: STOC 1986, pp. 1–5. ACM (1986)
-
(1986)
STOC 1986
, pp. 1-5
-
-
Barrington, D.A.M.1
-
4
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 149–168. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.M.2
-
5
-
-
79952503806
-
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1–16. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 1-16
-
-
Boneh, D.1
Freeman, D.M.2
-
7
-
-
84901660849
-
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
-
In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
-
Boneh, D., Gentry, C., Gorbunov, S., Halevi, S., Nikolaenko, V., Segev, G., Vaikuntanathan, V., Vinayagamurthy, D.: Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 533–556. Springer, Heidelberg (2014)
-
(2014)
EUROCRYPT 2014. LNCS
, vol.8441
, pp. 533-556
-
-
Boneh, D.1
Gentry, C.2
Gorbunov, S.3
Halevi, S.4
Nikolaenko, V.5
Segev, G.6
Vaikuntanathan, V.7
Vinayagamurthy, D.8
-
8
-
-
79955534142
-
Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Boyen, X.: Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 499–517. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 499-517
-
-
Boyen, X.1
-
9
-
-
84893301353
-
Lattice-based FHE as secure as PKE
-
Brakerski Z., Vaikuntanathan, V.: Lattice-based FHE as secure as PKE. In: ITCS, pp. 1–12 (2014)
-
(2014)
ITCS
, pp. 1-12
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
10
-
-
84861674721
-
Efficient network coding signatures in the standard model
-
In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680–696. Springer, Heidelberg (2012)
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 680-696
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
11
-
-
84905409138
-
Homomorphic signatures with efficient verification for polynomial functions
-
In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Homomorphic signatures with efficient verification for polynomial functions. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 371–389. Springer, Heidelberg (2014)
-
(2014)
CRYPTO 2014, Part I. LNCS
, vol.8616
, pp. 371-389
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
12
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523–552. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
13
-
-
84924401939
-
Obfuscation of probabilistic circuits and applications
-
In: Dodis, Y., Nielsen, J.B. (eds.), Springer, Heidelberg
-
Canetti, R., Lin, H., Tessaro, S., Vaikuntanathan, V.: Obfuscation of probabilistic circuits and applications. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015, Part II. LNCS, vol. 9015, pp. 468–497. Springer, Heidelberg (2015)
-
(2015)
TCC 2015, Part II. LNCS
, vol.9015
, pp. 468-497
-
-
Canetti, R.1
Lin, H.2
Tessaro, S.3
Vaikuntanathan, V.4
-
14
-
-
84911427746
-
Bootstrappable identity-based fully homomorphic encryption
-
In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.), Springer, Heidelberg
-
Clear, M., McGoldrick, C.: Bootstrappable identity-based fully homomorphic encryption. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 1–19. Springer, Heidelberg (2014)
-
(2014)
CANS 2014. LNCS
, vol.8813
, pp. 1-19
-
-
Clear, M.1
McGoldrick, C.2
-
15
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)
-
(2008)
SIAM J. Comput
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
16
-
-
84861691857
-
Improved security for linearly homomorphic signatures: A generic framework
-
In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
-
Freeman, D.M.: Improved security for linearly homomorphic signatures: a generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697–714. Springer, Heidelberg (2012)
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 697-714
-
-
Freeman, D.M.1
-
17
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169–178. ACM (2009)
-
(2009)
STOC 2009
, pp. 169-178
-
-
Gentry, C.1
-
18
-
-
84945944910
-
Leveled fully homomorphic signatures from standard lattices
-
ACM
-
Gorbunov, S., Vaikuntanathan, V., Wichs, D.: Leveled fully homomorphic signatures from standard lattices. In: STOC 2015, pp. 469–477. ACM (2015)
-
(2015)
STOC 2015
, pp. 469-477
-
-
Gorbunov, S.1
Vaikuntanathan, V.2
Wichs, D.3
-
19
-
-
84859976564
-
Trapdoors for lattices: Simpler, tighter, faster, smaller
-
In: Pointcheval, D., Johansson, T. (eds.), Springer, Heidelberg
-
Micciancio, D., Peikert, C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700–718. Springer, Heidelberg (2012)
-
(2012)
EUROCRYPT 2012. LNCS
, vol.7237
, pp. 700-718
-
-
Micciancio, D.1
Peikert, C.2
-
20
-
-
84884472921
-
Hardness of SIS and LWE with small parameters
-
In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Micciancio, D., Peikert, C.: Hardness of SIS and LWE with small parameters. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 21–39. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 21-39
-
-
Micciancio, D.1
Peikert, C.2
-
21
-
-
38749097694
-
Regev, O.:Worst-case to average-case reductions based on gaussian measures
-
Micciancio, D., Regev, O.:Worst-case to average-case reductions based on gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)
-
(2007)
SIAM J. Comput
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
-
22
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|