Leveled Fully Homomorphic Signatures from Standard Lattices

From MaRDI portal
Publication:2941539

DOI10.1145/2746539.2746576zbMath1321.94062OpenAlexW2071676384MaRDI QIDQ2941539

Daniel Wichs, Vinod Vaikuntanathan, Sergey Gorbunov

Publication date: 21 August 2015

Published in: Proceedings of the forty-seventh annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/1721.1/112962




Related Items (66)

Constraining and Watermarking PRFs from Milder AssumptionsCounterexamples to new circular security assumptions underlying iOAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityAdaptively secure distributed PRFs from LWEOn the statistical leak of the GGH13 multilinear map and some variantsOn the (In)Security of SNARKs in the Presence of OraclesEfficient Secure Multiparty Computation with Identifiable AbortDelegating RAM ComputationsMulti-key FHE from LWE, RevisitedTargeted Homomorphic Attribute-Based EncryptionGadget-based iNTRU lattice trapdoorsFaster Gaussian sampling for trapdoor lattices with arbitrary modulusHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsFully homomorphic NIZK and NIWI proofsBatch verifiable computation of outsourced functionsEfficient and fully secure lattice-based IBE with equality testKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeFunctional commitments for all functions, with transparent setup and from SISSuccinct vector, polynomial, and functional commitments from latticesMulti-key Homomorphic AuthenticatorsSuccinct classical verification of quantum computationStructure-preserving linearly homomorphic signature with designated combiner for subspaceLattice-based signatures with tight adaptive corruptions and moreA note on the post-quantum security of (ring) signaturesmrNISC from LWE with polynomial modulusmrNISC from LWE with polynomial modulusTriply adaptive UC NIZKCumulatively all-lossy-but-one trapdoor functions from standard assumptionsReverse firewalls for adaptively secure MPC without setupSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear CaseAdditive-homomorphic functional commitments and applications to homomorphic signaturesLattice-based programmable hash functions and applications\textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulationIdentity-based key-exposure resilient cloud storage public auditing scheme from latticesAdaptively secure inner product encryption from LWESuccinct LWE sampling, random polynomials, and obfuscationTowards tight adaptive security of non-interactive key exchangeVector and functional commitments from latticesDirect computation of branching programs and its applications to more efficient lattice-based cryptographySimulatable verifiable random function from the LWE assumptionA compiler for multi-key homomorphic signatures for Turing machinesPractical homomorphic message authenticators for arithmetic circuitsGeneric hardness of inversion on ring and its relation to self-bilinear mapVerifiable pattern matching on outsourced textsA more efficient leveled strongly-unforgeable fully homomorphic signature schemeCryptography with UpdatesMulti-theorem preprocessing NIZKs from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Multi-server verifiable delegation of computations: unconditional security and practical efficiencyGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationAdaptively secure MPC with sublinear communication complexityMultiparty reusable non-interactive secure computation from LWEUnbounded multi-party computation from learning with errorsCandidate obfuscation via oblivious LWE samplingBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeSingle-to-multi-theorem transformations for non-interactive statistical zero-knowledgeVerifiable Pattern Matching on Outsourced TextsFHE Circuit Privacy Almost for FreeProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityA new Gaussian sampling for trapdoor lattices with arbitrary modulusProgressive and efficient verification for digital signaturesHomomorphic Encryption


Uses Software


Cites Work




This page was built for publication: Leveled Fully Homomorphic Signatures from Standard Lattices