Fully-succinct multi-key homomorphic signatures from standard assumptions
From MaRDI portal
Publication:6652902
DOI10.1007/978-3-031-68382-4_10MaRDI QIDQ6652902FDOQ6652902
Authors: Gaspard Anthoine, David Balbás, Dario Fiore
Publication date: 13 December 2024
Recommendations
- Matrioska: a compiler for multi-key homomorphic signatures
- Multi-key homomorphic signatures unforgeable under insider corruption
- A compiler for multi-key homomorphic signatures for Turing machines
- Leveled fully homomorphic signatures from standard lattices
- The simplest multi-key linearly homomorphic signature scheme
Cites Work
- Fully homomorphic encryption using ideal lattices
- Efficient network coding signatures in the standard model
- Improved security for linearly homomorphic signatures: a generic framework
- Leveled fully homomorphic signatures from standard lattices
- Homomorphic signatures for polynomial functions
- Homomorphic network coding signatures in the standard model
- Secure network coding over the integers
- Signing a Linear Subspace: Signature Schemes for Network Coding
- Title not available (Why is that?)
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Title not available (Why is that?)
- Separating succinct non-interactive arguments from all falsifiable assumptions
- How to delegate computations publicly
- Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions
- Vector commitments and their applications
- The simplest multi-key linearly homomorphic signature scheme
- Fully homomorphic message authenticators
- Homomorphic signatures with efficient verification for polynomial functions
- New realizations of somewhere statistically binding hashing and positional accumulators
- On the communication complexity of secure function evaluation with long output
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
- Multi-key homomorphic signatures unforgeable under insider corruption
- Matrioska: a compiler for multi-key homomorphic signatures
- Multi-key Homomorphic Authenticators
- Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions
- Non-interactive batch arguments for NP from standard assumptions
- Fully-succinct publicly verifiable delegation from constant-size assumptions
- A compiler for multi-key homomorphic signatures for Turing machines
- Context hiding multi-key linearly homomorphic authenticators
- Somewhere statistical soundness, post-quantum security, and SNARGs
- On the (in)security of SNARKs in the presence of oracles
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Additive-homomorphic functional commitments and applications to homomorphic signatures
- Correlation intractability and SNARGs from sub-exponential DDH
- Boosting batch arguments and RAM delegation
- Chainable functional commitments for unbounded-depth circuits
- Lattice-based functional commitments: fast verification and cryptanalysis
- On instantiating unleveled fully-homomorphic signatures from falsifiable assumptions
- Succinct functional commitments for circuits from \(k\)-\textsf{Lin}
Cited In (1)
This page was built for publication: Fully-succinct multi-key homomorphic signatures from standard assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652902)