Malleable Proof Systems and Applications

From MaRDI portal
Publication:2894414


DOI10.1007/978-3-642-29011-4_18zbMath1297.94057MaRDI QIDQ2894414

Anna Lysyanskaya, Sarah Meiklejohn, Markulf Kohlweiss, Melissa Chase

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_18


94A60: Cryptography


Related Items

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption, Tagged One-Time Signatures: Tight Security and Optimal Tag Size, Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures, Verifiable Elections That Scale for Free, Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes, Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts, Non-malleable Codes with Split-State Refresh, Cryptography with Updates, Continuously non-malleable codes with split-state refresh, Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption, Extendable threshold ring signatures with enhanced anonymity, Mix-nets from re-randomizable and replayable CCA-secure public-key encryption, Traceable receipt-free encryption, Reverse firewalls for oblivious transfer extension and applications to zero-knowledge, Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE, Zero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomials, Structure-preserving signatures and commitments to group elements, Constant-size structure-preserving signatures: generic constructions and simple assumptions, Chosen ciphertext secure keyed-homomorphic public-key cryptosystems, Linearly-homomorphic signatures and scalable mix-nets, Reverse firewalls for actively secure MPCs, Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved, Selectively linkable group signatures -- stronger security and preserved verifiability, Subversion-resilient enhanced privacy ID, Universally composable subversion-resilient cryptography, Fully homomorphic NIZK and NIWI proofs, Improving the efficiency of re-randomizable and replayable CCA secure public key encryption, Leakage resilience from program obfuscation, Reconciling non-malleability with homomorphic encryption, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, Hardware security without secure hardware: how to decrypt with a password and a server, Policy-compliant signatures, How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones, Structure-Preserving Signatures from Standard Assumptions, Revisited