Pages that link to "Item:Q3617513"
From MaRDI portal
The following pages link to Signing a Linear Subspace: Signature Schemes for Network Coding (Q3617513):
Displayed 38 items.
- Lattice-based linearly homomorphic signatures in the standard model (Q284579) (← links)
- A new definition of homomorphic signature for identity management in mobile cloud computing (Q389372) (← links)
- Algebraic (trapdoor) one-way functions: constructions and applications (Q500981) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions (Q1671634) (← links)
- An efficient homomorphic aggregate signature scheme based on lattice (Q1718616) (← links)
- Practical homomorphic message authenticators for arithmetic circuits (Q1747657) (← links)
- Verifiable pattern matching on outsourced texts (Q1757465) (← links)
- An efficient MAC scheme for secure network coding with probabilistic detection (Q1762208) (← links)
- A computational perspective on network coding (Q1958831) (← links)
- A more efficient leveled strongly-unforgeable fully homomorphic signature scheme (Q2004727) (← links)
- Quantum homomorphic signature (Q2018161) (← links)
- Linearly-homomorphic signatures and scalable mix-nets (Q2055710) (← links)
- A compiler for multi-key homomorphic signatures for Turing machines (Q2232614) (← links)
- Computing on authenticated data (Q2344052) (← links)
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials (Q2423846) (← links)
- Linearly homomorphic signatures with designated combiner (Q2697930) (← links)
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures (Q2794502) (← links)
- Verifiable Pattern Matching on Outsourced Texts (Q2827727) (← links)
- Short Transitive Signatures for Directed Trees (Q2889993) (← links)
- Multi-key Homomorphic Authenticators (Q2953787) (← links)
- Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model (Q2988350) (← links)
- Secure multi-source network coding scheme with lattice signature (Q2993817) (← links)
- Efficient Secure Multiparty Computation with Identifiable Abort (Q3179367) (← links)
- Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys (Q3457069) (← links)
- Structure-Preserving Signatures from Standard Assumptions, Revisited (Q3457070) (← links)
- Network information flow (Q4501758) (← links)
- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures (Q4916021) (← links)
- Lattice-based linearly homomorphic signature scheme over binary field (Q5018301) (← links)
- Linearly Homomorphic Signatures with Designated Entities (Q5056030) (← links)
- Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability (Q5739031) (← links)
- Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation (Q5854430) (← links)
- Multi-theorem preprocessing NIZKs from lattices (Q5918862) (← links)
- Tracing a linear subspace: application to linearly-homomorphic group signatures (Q6070765) (← links)
- Structure-preserving linearly homomorphic signature with designated combiner for subspace (Q6108780) (← links)
- Attribute-based signatures for range of inner product and its applications (Q6134229) (← links)
- The state of the union: union-only signatures for data aggregation (Q6134829) (← links)
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case (Q6163662) (← links)