Secure network coding over the integers
From MaRDI portal
Publication:3562893
DOI10.1007/978-3-642-13013-7_9zbMATH Open1279.94075OpenAlexW1635348707MaRDI QIDQ3562893FDOQ3562893
Authors: Rosario Gennaro, Hugo Krawczyk, Tal Rabin, Jonathan Katz
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_9
Recommendations
- Homomorphic network coding signatures in the standard model
- Efficient network coding signatures in the standard model
- Signing a Linear Subspace: Signature Schemes for Network Coding
- Fast Signature Scheme for Network Coding
- An efficient dynamic-identity based signature scheme for secure network coding
Cited In (36)
- Title not available (Why is that?)
- Lattice-based linearly homomorphic signatures in the standard model
- Practical homomorphic message authenticators for arithmetic circuits
- Computing on authenticated data
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
- Linearly Homomorphic Signatures with Designated Entities
- An efficient MAC scheme for secure network coding with probabilistic detection
- Verifiable pattern matching on outsourced texts
- Lattice-based linearly homomorphic signature scheme over binary field
- Network coding signature schemes against related-key attacks in the random oracle model
- Towards tightly secure short linearly homomorphic signatures
- An efficient dynamic-identity based signature scheme for secure network coding
- Linearly homomorphic structure-preserving signatures and their applications
- Structure-preserving linearly homomorphic signature with designated combiner for subspace
- Homomorphic network coding signatures in the standard model
- Efficient network coding signatures in the standard model
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
- Multi-theorem preprocessing NIZKs from lattices
- Efficient completely context-hiding quotable and linearly homomorphic signatures
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
- Secure multi-source network coding scheme with lattice signature
- Secure \(N\)-dimensional simultaneous dense coding and applications
- Fully-succinct multi-key homomorphic signatures from standard assumptions
- Algebraic (trapdoor) one-way functions: constructions and applications
- A survey of emerging threats in cybersecurity
- Lightweight integrity for XOR network coding in wireless sensor networks
- CCA updatable encryption against malicious re-encryption attacks
- How to make a linear network code (strongly) secure
- Information security in a random network coding network
- Linearly homomorphic signatures with designated combiner
- Signing a Linear Subspace: Signature Schemes for Network Coding
- Linearly homomorphic authenticated encryption with provable correctness and public verifiability
- A new definition of homomorphic signature for identity management in mobile cloud computing
- An efficient homomorphic aggregate signature scheme based on lattice
- Preventing pollution attacks in multi-source network coding
This page was built for publication: Secure network coding over the integers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562893)