메뉴 건너뛰기




Volumn 8383 LNCS, Issue , 2014, Pages 538-555

Generalizing homomorphic MACs for arithmetic circuits

Author keywords

[No Author keywords available]

Indexed keywords

ENCODING (SYMBOLS); INTEGRATING CIRCUITS; LOGIC CIRCUITS;

EID: 84958524125     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-54631-0_31     Document Type: Conference Paper
Times cited : (30)

References (39)
  • 1
    • 68849097857 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-based integrity for network coding
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds Springer, Heidelberg
    • Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009
    • (2009) ACNS 2009. LNCS , vol.5536 , pp. 292-305
    • Agrawal, S.1    Boneh, D.2
  • 2
    • 79952517275 scopus 로고    scopus 로고
    • Homomorphic network coding signatures in the standard model
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds Springer, Heidelberg
    • Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17-34. Springer, Heidelberg (2011
    • (2011) PKC 2011. LNCS , vol.6571 , pp. 17-34
    • Attrapadung, N.1    Libert, B.2
  • 3
    • 84873972598 scopus 로고    scopus 로고
    • Efficient completely context-hiding quotable and linearly homomorphic signatures
    • Kurosawa, K., Hanaoka, G. (eds Springer, Heidelberg
    • Attrapadung, N., Libert, B., Peters, T.: Efficient completely context-hiding quotable and linearly homomorphic signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 386-404. Springer, Heidelberg (2013
    • (2013) PKC 2013. LNCS , vol.7778 , pp. 386-404
    • Attrapadung, N.1    Libert, B.2    Peters, T.3
  • 5
    • 80051977699 scopus 로고    scopus 로고
    • Verifiable delegation of computation over large datasets
    • Rogaway, P. (ed. Springer, Heidelberg
    • Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 111-131
    • Benabbas, S.1    Gennaro, R.2    Vahlis, Y.3
  • 7
    • 84879803522 scopus 로고    scopus 로고
    • Recursive composition and bootstrapping for snarks and proof-carrying data
    • Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and bootstrapping for snarks and proof-carrying data. In: STOC (2013
    • (2013) STOC
    • Bitansky, N.1    Canetti, R.2    Chiesa, A.3    Tromer, E.4
  • 8
    • 84873941196 scopus 로고    scopus 로고
    • Succinct noninteractive arguments via linear interactive proofs
    • Sahai, A. (ed. Springer, Heidelberg
    • Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O., Ostrovsky, R.: Succinct noninteractive arguments via linear interactive proofs. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 315-333. Springer, Heidelberg (2013
    • (2013) TCC 2013. LNCS , vol.7785 , pp. 315-333
    • Bitansky, N.1    Chiesa, A.2    Ishai, Y.3    Paneth, O.4    Ostrovsky, R.5
  • 9
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer, R. (ed. Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005
    • (2005) EUROCRYPT 2005. LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 10
    • 67049095592 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • Jarecki, S., Tsudik, G. (eds Springer, Heidelberg
    • Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009
    • (2009) PKC 2009. LNCS , vol.5443 , pp. 68-87
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 11
    • 79958003537 scopus 로고    scopus 로고
    • Homomorphic signatures for polynomial functions
    • Paterson, K.G. (ed. Springer, Heidelberg
    • Boneh, D., Freeman, D.M.: Homomorphic signatures for polynomial functions. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 149-168. Springer, Heidelberg (2011
    • (2011) EUROCRYPT 2011. LNCS , vol.6632 , pp. 149-168
    • Boneh, D.1    Freeman, D.M.2
  • 12
    • 79952503806 scopus 로고    scopus 로고
    • Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds Springer, Heidelberg
    • Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1-16. Springer, Heidelberg (2011
    • (2011) PKC 2011. LNCS , vol.6571 , pp. 1-16
    • Boneh, D.1    Freeman, D.M.2
  • 13
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Kilian, J. (ed. Springer, Heidelberg
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 14
    • 52149104493 scopus 로고    scopus 로고
    • The uber-assumption family
    • Galbraith, S.D., Paterson, K.G. (eds Springer, Heidelberg
    • Boyen, X.: The uber-assumption family. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39-56. Springer, Heidelberg (2008
    • (2008) Pairing 2008. LNCS , vol.5209 , pp. 39-56
    • Boyen, X.1
  • 15
    • 80955132201 scopus 로고    scopus 로고
    • Efficient fully homomorphic encryption from (standard) LWE
    • Ostrovsky, R. (ed. IEEE Computer Society Press (October 2011
    • Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Ostrovsky, R. (ed.) 52nd FOCS, pp. 97-106. IEEE Computer Society Press (October 2011
    • 52nd FOCS , pp. 97-106
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 16
    • 84883564164 scopus 로고    scopus 로고
    • Practical homomorphic mACs for arithmetic circuits
    • Johansson, T., Nguyen, P.Q. (eds Springer, Heidelberg
    • Catalano, D., Fiore, D.: Practical homomorphic mACs for arithmetic circuits. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 336-352. Springer, Heidelberg (2013
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 336-352
    • Catalano, D.1    Fiore, D.2
  • 17
    • 84873952327 scopus 로고    scopus 로고
    • Algebraic (Trapdoor) one-way functions and their applications
    • Sahai, A. (ed. Springer, Heidelberg
    • Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K.: Algebraic (Trapdoor) one-way functions and their applications. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 680-699. Springer, Heidelberg (2013
    • (2013) TCC 2013. LNCS , vol.7785 , pp. 680-699
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Vamvourellis, K.4
  • 18
    • 79958003300 scopus 로고    scopus 로고
    • Adaptive pseudo-free groups and applications
    • Paterson, K.G. (ed. Springer, Heidelberg
    • Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207-223. Springer, Heidelberg (2011
    • (2011) EUROCRYPT 2011. LNCS , vol.6632 , pp. 207-223
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 19
    • 84861674721 scopus 로고    scopus 로고
    • Efficient network coding signatures in the standard model
    • Fischlin, M., Buchmann, J., Manulis, M. (eds Springer, Heidelberg
    • Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 680-696. Springer, Heidelberg (2012
    • (2012) PKC 2012. LNCS , vol.7293 , pp. 680-696
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 20
    • 80051994919 scopus 로고    scopus 로고
    • Memory delegation
    • Rogaway, P. (ed. Springer, Heidelberg
    • Chung, K.-M., Kalai, Y.T., Liu, F.-H., Raz, R.: Memory delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 151-168
    • Chung, K.-M.1    Kalai, Y.T.2    Liu, F.-H.3    Raz, R.4
  • 21
    • 84884473382 scopus 로고    scopus 로고
    • Practical multilinear maps over the integers
    • Canetti, R., Garay, J.A. (eds Springer, Heidelberg
    • Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013
    • (2013) CRYPTO 2013, Part I. LNCS , vol.8042 , pp. 476-493
    • Coron, J.-S.1    Lepoint, T.2    Tibouchi, M.3
  • 22
    • 84869379879 scopus 로고    scopus 로고
    • Publicly verifiable delegation of large polynomials and matrix computations with applications
    • ACM Press October
    • Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: 2012 ACM Conference on Computer and Communication Security. ACM Press (October 2012
    • (2012) 2012 ACM Conference on Computer and Communication Security
    • Fiore, D.1    Gennaro, R.2
  • 23
    • 84861691857 scopus 로고    scopus 로고
    • Improved security for linearly homomorphic signatures: A generic framework
    • Fischlin, M., Buchmann, J., Manulis, M. (eds Springer, Heidelberg
    • Freeman, D.M.: Improved security for linearly homomorphic signatures: A generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697-714. Springer, Heidelberg (2012
    • (2012) PKC 2012. LNCS , vol.7293 , pp. 697-714
    • Freeman, D.M.1
  • 24
    • 84879875394 scopus 로고    scopus 로고
    • Candidate multilinear maps from ideal lattices
    • Johansson, T., Nguyen, P.Q. (eds Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 1-17
    • Garg, S.1    Gentry, C.2    Halevi, S.3
  • 25
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 26
    • 84883413063 scopus 로고    scopus 로고
    • Quadratic span programs and succinct NIZKs without PCPs
    • Johansson, T., Nguyen, P.Q. (eds Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B., Raykova, M.: Quadratic span programs and succinct NIZKs without PCPs. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 626-645. Springer, Heidelberg (2013
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 626-645
    • Gennaro, R.1    Gentry, C.2    Parno, B.3    Raykova, M.4
  • 27
    • 78649897589 scopus 로고    scopus 로고
    • Secure network coding over the integers
    • Nguyen, P.Q., Pointcheval, D. (eds Springer, Heidelberg
    • Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 142-160
    • Gennaro, R.1    Katz, J.2    Krawczyk, H.3    Rabin, T.4
  • 28
    • 84892393413 scopus 로고    scopus 로고
    • Fully homomorphic message authenticators
    • Sako, K., Sarkar, P. (eds Springer, Heidelberg
    • Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 301-320. Springer, Heidelberg (2013
    • (2013) ASIACRYPT 2013, Part II. LNCS , vol.8270 , pp. 301-320
    • Gennaro, R.1    Wichs, D.2
  • 29
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Mitzenmacher, M. (ed. ACM Press (May/June
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 169-178. ACM Press (May/June 2009
    • (2009) 41st ACM STOC , pp. 169-178
    • Gentry, C.1
  • 30
    • 79959724747 scopus 로고    scopus 로고
    • Separating succinct non-interactive arguments from all falsifiable assumptions
    • Fortnow, L., Vadhan, S.P. (eds ACM Press (June 2011
    • Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: Fortnow, L., Vadhan, S.P. (eds.) 43rd ACMSTOC, pp. 99-108. ACM Press (June 2011
    • 43rd ACMSTOC , pp. 99-108
    • Gentry, C.1    Wichs, D.2
  • 31
    • 57049095424 scopus 로고    scopus 로고
    • Delegating computation: Interactive proofs for muggles
    • Ladner, R.E., Dwork, C. (eds ACM Press (May
    • Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: Interactive proofs for muggles. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 113-122. ACM Press (May 2008
    • (2008) 40th ACM STOC , pp. 113-122
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 32
    • 84884477196 scopus 로고    scopus 로고
    • Full domain hash from (Leveled) multilinear maps and identity-based aggregate signatures
    • Canetti, R., Garay, J.A. (eds Springer, Heidelberg
    • Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (Leveled) multilinear maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494-512. Springer, Heidelberg (2013
    • (2013) CRYPTO 2013, Part I. LNCS , vol.8042 , pp. 494-512
    • Hohenberger, S.1    Sahai, A.2    Waters, B.3
  • 33
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Preneel, B. (ed. Springer, Heidelberg
    • Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002
    • (2002) CT-RSA 2002. LNCS , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 34
    • 0026963441 scopus 로고
    • A note on efficient zero-knowledge proofs and arguments
    • ACM Press (May
    • Kilian, J.: A note on efficient zero-knowledge proofs and arguments. In: 24th ACM STOC, pp. 723-732. ACM Press (May 1992
    • (1992) 24th ACM STOC , pp. 723-732
    • Kilian, J.1
  • 35
    • 0002597886 scopus 로고
    • Cs proofs
    • November
    • Micali, S.: Cs proofs. In: 35th FOCS (November 1994
    • (1994) 35th FOCS
    • Micali, S.1
  • 36
    • 84957663142 scopus 로고    scopus 로고
    • XOR and non-XOR differential probabilities
    • Stern, J. (ed. Springer, Heidelberg
    • Hawkes, P.: XOR and non-XOR differential probabilities. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 272-285. Springer, Heidelberg (1999
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 272-285
    • Hawkes, P.1
  • 37
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Cramer, R. (ed. Springer, Heidelberg
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012
    • (2012) TCC 2012. LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 39
    • 40249118374 scopus 로고    scopus 로고
    • Incrementally verifiable computation or proofs of knowledge imply time/space efficiency
    • Canetti, R. (ed. Springer, Heidelberg
    • Valiant, P.: Incrementally verifiable computation or proofs of knowledge imply time/space efficiency. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 1-18. Springer, Heidelberg (2008
    • (2008) TCC 2008. LNCS , vol.4948 , pp. 1-18
    • Valiant, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.