scientific article; zbMATH DE number 2079932

From MaRDI portal
Revision as of 07:01, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4472078

zbMath1048.94513MaRDI QIDQ4472078

No author found.

Publication date: 3 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2271/22710244.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Short Transitive Signatures for Directed TreesLattice-based linearly homomorphic signatures in the standard modelOn the statistical leak of the GGH13 multilinear map and some variantsLinearly Homomorphic Signatures with Designated EntitiesDissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databasesHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsModification tolerant signature schemes: location and correctionA new definition of homomorphic signature for identity management in mobile cloud computingRing Trapdoor Redactable Signatures from LatticeLinearly homomorphic structure-preserving signatures and their applicationsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeMulti-key Homomorphic AuthenticatorsLocally verifiable signature and key aggregationProtean Signature SchemesStructure-preserving linearly homomorphic signature with designated combiner for subspaceStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsThe state of the union: union-only signatures for data aggregationSpreading alerts quietly and the subgroup escape problemCHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear CaseLinearly homomorphic signatures with designated combinerAn efficient homomorphic aggregate signature scheme based on latticeReasoning about XML update constraintsA simple transitive signature scheme for directed treesDrawing Bobbin Lace Graphs, or, Fundamental Cycles for a Subclass of Periodic GraphsProxy Re-signatures in the Standard ModelA t-out-of-n Redactable Signature SchemeAlgebraic (trapdoor) one-way functions: constructions and applicationsTrusted computing with addition machines. IIPractical homomorphic message authenticators for arithmetic circuitsIdentity-based quotable ring signatureEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesEfficient digital signatures from RSA without random oraclesVerifiable pattern matching on outsourced textsA more efficient leveled strongly-unforgeable fully homomorphic signature schemeLinearly Homomorphic Authenticated Encryption with Provable Correctness and Public VerifiabilitySanitizable and Deletable SignatureZero-Knowledge Authenticated Order Queries and Order Statistics on a ListAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesProvably Secure (Broadcast) Homomorphic SigncryptionShort Redactable Signatures Using Random TreesBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsLinearly-homomorphic signatures and scalable mix-netsUpdatable signatures and message authentication codesVerifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and TreesVerifiable Pattern Matching on Outsourced TextsA Storage Efficient Redactable Signature in the Standard ModelSanitizable Signatures RevisitedComputing on authenticated dataSanitizable SignaturesLattice-based linearly homomorphic signature scheme over binary fieldLocating modifications in signed data for partial data integrityUnlinkable and invisible \(\gamma \)-sanitizable signatures