-
1
-
-
68849097857
-
Homomorphic MACs: MAC-based integrity for network coding
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds Springer, Heidelberg
-
Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
79952517275
-
Homomorphic network coding signatures in the standard model
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds Springer, Heidelberg
-
Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 17-34
-
-
Attrapadung, N.1
Libert, B.2
-
3
-
-
84873972598
-
Efficient completely context-hiding quotable and linearly homomorphic signatures
-
Kurosawa, K., Hanaoka, G. (eds Springer, Heidelberg
-
Attrapadung, N., Libert, B., Peters, T.: Efficient completely context-hiding quotable and linearly homomorphic signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 386-404. Springer, Heidelberg (2013
-
(2013)
PKC 2013. LNCS
, vol.7778
, pp. 386-404
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
5
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Rogaway, P. (ed. Springer, Heidelberg
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
6
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: ITCS 2012: Proceedings of the 3rd Symposium on Innovations in Theoretical Computer Science (2012
-
(2012)
ITCS 2012: Proceedings of the 3rd Symposium on Innovations in Theoretical Computer Science
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
7
-
-
84879803522
-
Recursive composition and bootstrapping for snarks and proof-carrying data
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and bootstrapping for snarks and proof-carrying data. In: STOC (2013
-
(2013)
STOC
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
8
-
-
84873941196
-
Succinct noninteractive arguments via linear interactive proofs
-
Sahai, A. (ed. Springer, Heidelberg
-
Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O., Ostrovsky, R.: Succinct noninteractive arguments via linear interactive proofs. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 315-333. Springer, Heidelberg (2013
-
(2013)
TCC 2013. LNCS
, vol.7785
, pp. 315-333
-
-
Bitansky, N.1
Chiesa, A.2
Ishai, Y.3
Paneth, O.4
Ostrovsky, R.5
-
9
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer, R. (ed. Springer, Heidelberg
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
10
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Jarecki, S., Tsudik, G. (eds Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
11
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
Paterson, K.G. (ed. Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 149-168. Springer, Heidelberg (2011
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.M.2
-
12
-
-
79952503806
-
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds Springer, Heidelberg
-
Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1-16. Springer, Heidelberg (2011
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 1-16
-
-
Boneh, D.1
Freeman, D.M.2
-
13
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Kilian, J. (ed. Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
14
-
-
52149104493
-
The uber-assumption family
-
Galbraith, S.D., Paterson, K.G. (eds Springer, Heidelberg
-
Boyen, X.: The uber-assumption family. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008
-
(2008)
Pairing 2008. LNCS
, vol.5209
, pp. 39-56
-
-
Boyen, X.1
-
15
-
-
80955132201
-
Efficient fully homomorphic encryption from (standard) LWE
-
Ostrovsky, R. (ed. IEEE Computer Society Press (October 2011
-
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Ostrovsky, R. (ed.) 52nd FOCS, pp. 97-106. IEEE Computer Society Press (October 2011
-
52nd FOCS
, pp. 97-106
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
16
-
-
84883564164
-
Practical homomorphic mACs for arithmetic circuits
-
Johansson, T., Nguyen, P.Q. (eds Springer, Heidelberg
-
Catalano, D., Fiore, D.: Practical homomorphic mACs for arithmetic circuits. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 336-352. Springer, Heidelberg (2013
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 336-352
-
-
Catalano, D.1
Fiore, D.2
-
17
-
-
84873952327
-
Algebraic (Trapdoor) one-way functions and their applications
-
Sahai, A. (ed. Springer, Heidelberg
-
Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (Trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013
-
(2013)
TCC 2013. LNCS
, vol.7785
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
-
18
-
-
79958003300
-
Adaptive pseudo-free groups and applications
-
Paterson, K.G. (ed. Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 207-223
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
19
-
-
84861674721
-
Efficient network coding signatures in the standard model
-
Fischlin, M., Buchmann, J., Manulis, M. (eds Springer, Heidelberg
-
Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 680-696
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
20
-
-
80051994919
-
Memory delegation
-
Rogaway, P. (ed. Springer, Heidelberg
-
Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 151-168
-
-
Chung, K.-M.1
Kalai, Y.T.2
Liu, F.-H.3
Raz, R.4
-
21
-
-
84884473382
-
Practical multilinear maps over the integers
-
Canetti, R., Garay, J.A. (eds Springer, Heidelberg
-
Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 476-493
-
-
Coron, J.-S.1
Lepoint, T.2
Tibouchi, M.3
-
22
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations with applications
-
ACM Press October
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: 2012 ACM Conference on Computer and Communication Security. ACM Press (October 2012
-
(2012)
2012 ACM Conference on Computer and Communication Security
-
-
Fiore, D.1
Gennaro, R.2
-
23
-
-
84861691857
-
Improved security for linearly homomorphic signatures: A generic framework
-
Fischlin, M., Buchmann, J., Manulis, M. (eds Springer, Heidelberg
-
Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 697-714
-
-
Freeman, D.M.1
-
24
-
-
84879875394
-
Candidate multilinear maps from ideal lattices
-
Johansson, T., Nguyen, P.Q. (eds Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 1-17
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
-
25
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
26
-
-
84883413063
-
Quadratic span programs and succinct NIZKs without PCPs
-
Johansson, T., Nguyen, P.Q. (eds Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B., Raykova, M.: Quadratic span programs and succinct NIZKs without PCPs. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 626-645. Springer, Heidelberg (2013
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 626-645
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
Raykova, M.4
-
27
-
-
78649897589
-
Secure network coding over the integers
-
Nguyen, P.Q., Pointcheval, D. (eds Springer, Heidelberg
-
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
28
-
-
84892393413
-
Fully homomorphic message authenticators
-
Sako, K., Sarkar, P. (eds Springer, Heidelberg
-
Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 301-320. Springer, Heidelberg (2013
-
(2013)
ASIACRYPT 2013, Part II. LNCS
, vol.8270
, pp. 301-320
-
-
Gennaro, R.1
Wichs, D.2
-
29
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Mitzenmacher, M. (ed. ACM Press (May/June
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 169-178. ACM Press (May/June 2009
-
(2009)
41st ACM STOC
, pp. 169-178
-
-
Gentry, C.1
-
30
-
-
79959724747
-
Separating succinct non-interactive arguments from all falsifiable assumptions
-
Fortnow, L., Vadhan, S.P. (eds ACM Press (June 2011
-
Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: Fortnow, L., Vadhan, S.P. (eds.) 43rd ACMSTOC, pp. 99-108. ACM Press (June 2011
-
43rd ACMSTOC
, pp. 99-108
-
-
Gentry, C.1
Wichs, D.2
-
31
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
Ladner, R.E., Dwork, C. (eds ACM Press (May
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: Interactive proofs for muggles. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 113-122. ACM Press (May 2008
-
(2008)
40th ACM STOC
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
32
-
-
84884477196
-
Full domain hash from (Leveled) multilinear maps and identity-based aggregate signatures
-
Canetti, R., Garay, J.A. (eds Springer, Heidelberg
-
Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (Leveled) multilinear maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494-512. Springer, Heidelberg (2013
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 494-512
-
-
Hohenberger, S.1
Sahai, A.2
Waters, B.3
-
33
-
-
84944905011
-
Homomorphic signature schemes
-
Preneel, B. (ed. Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
34
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
ACM Press (May
-
Kilian, J.: A note on efficient zero-knowledge proofs and arguments. In: 24th ACM STOC, pp. 723-732. ACM Press (May 1992
-
(1992)
24th ACM STOC
, pp. 723-732
-
-
Kilian, J.1
-
35
-
-
0002597886
-
Cs proofs
-
November
-
Micali, S.: Cs proofs. In: 35th FOCS (November 1994
-
(1994)
35th FOCS
-
-
Micali, S.1
-
36
-
-
84957663142
-
XOR and non-XOR differential probabilities
-
Stern, J. (ed. Springer, Heidelberg
-
Hawkes, P.: XOR and non-XOR differential probabilities. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 272-285. Springer, Heidelberg (1999
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 272-285
-
-
Hawkes, P.1
-
37
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Cramer, R. (ed. Springer, Heidelberg
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
39
-
-
40249118374
-
Incrementally verifiable computation or proofs of knowledge imply time/space efficiency
-
Canetti, R. (ed. Springer, Heidelberg
-
Valiant, P.: Incrementally verifiable computation or proofs of knowledge imply time/space efficiency. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 1-18. Springer, Heidelberg (2008
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 1-18
-
-
Valiant, P.1
|