Delegating a product of group exponentiations with application to signature schemes
From MaRDI portal
Publication:2025335
DOI10.1515/jmc-2019-0036zbMath1464.94034OpenAlexW3095424429MaRDI QIDQ2025335
Matluba Khodjaeva, Vladimir Shpilrain, Delaram Kahrobaei, Giovanni Di Crescenzo
Publication date: 12 May 2021
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2019-0036
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Related Items
Cites Work
- Efficient signature generation by smart cards
- Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups
- Secure outsourcing of modular exponentiations under single untrusted programme model
- Speeding up exponentiation using an untrusted computational resource
- An algorithm for modular exponentiation.
- New Algorithms for Secure Outsourcing of Modular Exponentiations
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Improved Delegation of Computation Using Fully Homomorphic Encryption
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- On the Evaluation of Powers and Monomials
- On the Evaluation of Powers
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Fully homomorphic encryption using ideal lattices
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item