Homomorphic Signatures for Polynomial Functions

From MaRDI portal
Revision as of 21:32, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3003381

DOI10.1007/978-3-642-20465-4_10zbMath1281.94072OpenAlexW2147412664MaRDI QIDQ3003381

Dan Boneh, David M. Freeman

Publication date: 27 May 2011

Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_10




Related Items (40)

Short Transitive Signatures for Directed TreesLattice-based linearly homomorphic signatures in the standard modelLinearly Homomorphic Signatures with Designated EntitiesTrapdoors for Ideal Lattices with ApplicationsOn the (In)Security of SNARKs in the Presence of OraclesProgrammable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public KeysFaster Gaussian sampling for trapdoor lattices with arbitrary modulusHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsFully homomorphic NIZK and NIWI proofsA new definition of homomorphic signature for identity management in mobile cloud computingLinearly homomorphic structure-preserving signatures and their applicationsBatch verifiable computation of outsourced functionsMulti-key Homomorphic AuthenticatorsProtean Signature SchemesAdditive-homomorphic functional commitments and applications to homomorphic signaturesLinearly homomorphic signatures with designated combinerAn efficient homomorphic aggregate signature scheme based on latticeA compiler for multi-key homomorphic signatures for Turing machinesAlgebraic (trapdoor) one-way functions: constructions and applicationsTrusted computing with addition machines. IIPractical homomorphic message authenticators for arithmetic circuitsIdentity-based quotable ring signatureEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesEfficient digital signatures from RSA without random oraclesVerifiable pattern matching on outsourced textsA more efficient leveled strongly-unforgeable fully homomorphic signature schemeCryptography with UpdatesLinearly Homomorphic Authenticated Encryption with Provable Correctness and Public VerifiabilityWatermarking cryptographic functionalities from standard lattice assumptionsAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesMulti-theorem preprocessing NIZKs from latticesLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationLinearly-homomorphic signatures and scalable mix-netsThe Geometry of Lattice CryptographyVerifiable Pattern Matching on Outsourced TextsOn Constructing Homomorphic Encryption Schemes from Coding TheoryA new Gaussian sampling for trapdoor lattices with arbitrary modulusComputing on authenticated dataLattice-based linearly homomorphic signature scheme over binary field




This page was built for publication: Homomorphic Signatures for Polynomial Functions