Computing on Authenticated Data
From MaRDI portal
Publication:2891473
DOI10.1007/978-3-642-28914-9_1zbMath1292.94017OpenAlexW2133825295MaRDI QIDQ2891473
Brent Waters, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Jae-Hyun Ahn
Publication date: 15 June 2012
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_1
Related Items (23)
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions ⋮ Reconciling non-malleability with homomorphic encryption ⋮ Linearly homomorphic structure-preserving signatures and their applications ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ QANIZK for adversary-dependent languages and their applications ⋮ Tracing a linear subspace: application to linearly-homomorphic group signatures ⋮ Structure-preserving signatures on equivalence classes and constant-size anonymous credentials ⋮ Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding ⋮ Attribute-based signatures for range of inner product and its applications ⋮ The state of the union: union-only signatures for data aggregation ⋮ Linearly homomorphic signatures with designated combiner ⋮ An efficient homomorphic aggregate signature scheme based on lattice ⋮ Practical homomorphic message authenticators for arithmetic circuits ⋮ Identity-based quotable ring signature ⋮ Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures ⋮ A more efficient leveled strongly-unforgeable fully homomorphic signature scheme ⋮ Chameleon-Hashes with Ephemeral Trapdoors ⋮ Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives ⋮ Zero-Knowledge Authenticated Order Queries and Order Statistics on a List ⋮ Non-malleable vector commitments via local equivocability ⋮ Linearly-homomorphic signatures and scalable mix-nets ⋮ Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees ⋮ An alternative approach to public cloud data auditing supporting data dynamics
This page was built for publication: Computing on Authenticated Data