Computing on Authenticated Data

From MaRDI portal
Revision as of 20:32, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2891473

DOI10.1007/978-3-642-28914-9_1zbMath1292.94017OpenAlexW2133825295MaRDI QIDQ2891473

Brent Waters, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Jae-Hyun Ahn

Publication date: 15 June 2012

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_1




Related Items (23)

Homomorphic signatures with sublinear public keys via asymmetric programmable hash functionsReconciling non-malleability with homomorphic encryptionLinearly homomorphic structure-preserving signatures and their applicationsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeQANIZK for adversary-dependent languages and their applicationsTracing a linear subspace: application to linearly-homomorphic group signaturesStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingAttribute-based signatures for range of inner product and its applicationsThe state of the union: union-only signatures for data aggregationLinearly homomorphic signatures with designated combinerAn efficient homomorphic aggregate signature scheme based on latticePractical homomorphic message authenticators for arithmetic circuitsIdentity-based quotable ring signatureEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesA more efficient leveled strongly-unforgeable fully homomorphic signature schemeChameleon-Hashes with Ephemeral TrapdoorsRevisiting Cryptographic Accumulators, Additional Properties and Relations to Other PrimitivesZero-Knowledge Authenticated Order Queries and Order Statistics on a ListNon-malleable vector commitments via local equivocabilityLinearly-homomorphic signatures and scalable mix-netsVerifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and TreesAn alternative approach to public cloud data auditing supporting data dynamics




This page was built for publication: Computing on Authenticated Data