scientific article; zbMATH DE number 2079932
From MaRDI portal
Publication:4472078
Recommendations
Cited in
(71)- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
- Fully-succinct multi-key homomorphic signatures from standard assumptions
- Sanitizable and Deletable Signature
- Quantum homomorphic aggregate signature based on quantum Fourier transform
- Ring trapdoor redactable signatures from lattice
- Chainable functional commitments for unbounded-depth circuits
- Towards tightly secure short linearly homomorphic signatures
- Quotable signatures for authenticating shared quotes
- A t-out-of-n Redactable Signature Scheme
- Homomorphic signatures for subset and superset mixed predicates and its applications
- The state of the union: union-only signatures for data aggregation
- On instantiating unleveled fully-homomorphic signatures from falsifiable assumptions
- Efficient universally-verifiable electronic voting with everlasting privacy
- Linearly homomorphic authenticated encryption with provable correctness and public verifiability
- On the statistical leak of the GGH13 multilinear map and some variants
- Computing on authenticated data: new privacy definitions and constructions
- Efficient completely context-hiding quotable and linearly homomorphic signatures
- A simple transitive signature scheme for directed trees
- Updatable signatures and message authentication codes
- Linearly homomorphic signatures with designated combiner
- Proxy Re-signatures in the Standard Model
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
- Sanitizable signatures
- Sanitizable Signatures Revisited
- A more efficient leveled strongly-unforgeable fully homomorphic signature scheme
- Linearly homomorphic structure-preserving signatures and their applications
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Homomorphic signatures for polynomial functions
- Unlinkable and invisible \(\gamma \)-sanitizable signatures
- Multi-key Homomorphic Authenticators
- Verifiable zero-knowledge order queries and updates for fully dynamic lists and trees
- Lattice-based linearly homomorphic signatures in the standard model
- Protean Signature Schemes
- Trusted computing with addition machines. II
- Short Redactable Signatures Using Random Trees
- Improved security for linearly homomorphic signatures: a generic framework
- Linearly-homomorphic signatures and scalable mix-nets
- Spreading alerts quietly and the subgroup escape problem
- Computing on authenticated data
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
- A Storage Efficient Redactable Signature in the Standard Model
- On the security notions for homomorphic signatures
- Provably secure homomorphic signcryption
- Homomorphic Encryption and Signatures from Vector Decomposition
- Structure-preserving linearly homomorphic signature with designated combiner for subspace
- Provably secure (broadcast) homomorphic signcryption
- An efficient homomorphic aggregate signature scheme based on lattice
- Locating modifications in signed data for partial data integrity
- A new definition of homomorphic signature for identity management in mobile cloud computing
- Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
- Linearly Homomorphic Signatures with Designated Entities
- A linearly homomorphic signature scheme from weaker assumptions
- Verifiable pattern matching on outsourced texts
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
- Lattice-based linearly homomorphic signature scheme over binary field
- The symmetric signature
- Verifiable pattern matching on outsourced texts
- Locally verifiable signature and key aggregation
- Drawing bobbin lace graphs, or, fundamental cycles for a subclass of periodic graphs
- Reasoning about XML update constraints
- Practical homomorphic message authenticators for arithmetic circuits
- Modification tolerant signature schemes: location and correction
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Short Transitive Signatures for Directed Trees
- Algebraic (trapdoor) one-way functions: constructions and applications
- scientific article; zbMATH DE number 4057442 (Why is no real title available?)
- Identity-based quotable ring signature
- List signature schemes
- Homomorphic signature schemes. A survey
- Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases
- Efficient digital signatures from RSA without random oracles
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4472078)