scientific article; zbMATH DE number 2079932
From MaRDI portal
Publication:4472078
zbMath1048.94513MaRDI QIDQ4472078
No author found.
Publication date: 3 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2271/22710244.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Short Transitive Signatures for Directed Trees ⋮ Lattice-based linearly homomorphic signatures in the standard model ⋮ On the statistical leak of the GGH13 multilinear map and some variants ⋮ Linearly Homomorphic Signatures with Designated Entities ⋮ Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases ⋮ Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions ⋮ Modification tolerant signature schemes: location and correction ⋮ A new definition of homomorphic signature for identity management in mobile cloud computing ⋮ Ring Trapdoor Redactable Signatures from Lattice ⋮ Linearly homomorphic structure-preserving signatures and their applications ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Multi-key Homomorphic Authenticators ⋮ Locally verifiable signature and key aggregation ⋮ Protean Signature Schemes ⋮ Structure-preserving linearly homomorphic signature with designated combiner for subspace ⋮ Structure-preserving signatures on equivalence classes and constant-size anonymous credentials ⋮ The state of the union: union-only signatures for data aggregation ⋮ Spreading alerts quietly and the subgroup escape problem ⋮ CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case ⋮ Linearly homomorphic signatures with designated combiner ⋮ An efficient homomorphic aggregate signature scheme based on lattice ⋮ Reasoning about XML update constraints ⋮ A simple transitive signature scheme for directed trees ⋮ Drawing Bobbin Lace Graphs, or, Fundamental Cycles for a Subclass of Periodic Graphs ⋮ Proxy Re-signatures in the Standard Model ⋮ A t-out-of-n Redactable Signature Scheme ⋮ Algebraic (trapdoor) one-way functions: constructions and applications ⋮ Trusted computing with addition machines. II ⋮ Practical homomorphic message authenticators for arithmetic circuits ⋮ Identity-based quotable ring signature ⋮ Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures ⋮ Efficient digital signatures from RSA without random oracles ⋮ Verifiable pattern matching on outsourced texts ⋮ A more efficient leveled strongly-unforgeable fully homomorphic signature scheme ⋮ Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability ⋮ Sanitizable and Deletable Signature ⋮ Zero-Knowledge Authenticated Order Queries and Order Statistics on a List ⋮ Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures ⋮ Provably Secure (Broadcast) Homomorphic Signcryption ⋮ Short Redactable Signatures Using Random Trees ⋮ Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations ⋮ Linearly-homomorphic signatures and scalable mix-nets ⋮ Updatable signatures and message authentication codes ⋮ Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees ⋮ Verifiable Pattern Matching on Outsourced Texts ⋮ A Storage Efficient Redactable Signature in the Standard Model ⋮ Sanitizable Signatures Revisited ⋮ Computing on authenticated data ⋮ Sanitizable Signatures ⋮ Lattice-based linearly homomorphic signature scheme over binary field ⋮ Locating modifications in signed data for partial data integrity ⋮ Unlinkable and invisible \(\gamma \)-sanitizable signatures