Pages that link to "Item:Q2941539"
From MaRDI portal
The following pages link to Leveled Fully Homomorphic Signatures from Standard Lattices (Q2941539):
Displaying 50 items.
- Batch verifiable computation of outsourced functions (Q887441) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- On the statistical leak of the GGH13 multilinear map and some variants (Q1633467) (← links)
- Faster Gaussian sampling for trapdoor lattices with arbitrary modulus (Q1648788) (← links)
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions (Q1671634) (← links)
- Practical homomorphic message authenticators for arithmetic circuits (Q1747657) (← links)
- Verifiable pattern matching on outsourced texts (Q1757465) (← links)
- Generic hardness of inversion on ring and its relation to self-bilinear map (Q1989358) (← links)
- A more efficient leveled strongly-unforgeable fully homomorphic signature scheme (Q2004727) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Multi-server verifiable delegation of computations: unconditional security and practical efficiency (Q2051777) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- Unbounded multi-party computation from learning with errors (Q2056765) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme (Q2056805) (← links)
- Single-to-multi-theorem transformations for non-interactive statistical zero-knowledge (Q2061955) (← links)
- Progressive and efficient verification for digital signatures (Q2096619) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security (Q2132442) (← links)
- Gadget-based iNTRU lattice trapdoors (Q2152053) (← links)
- Fully homomorphic NIZK and NIWI proofs (Q2175946) (← links)
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices (Q2200702) (← links)
- A compiler for multi-key homomorphic signatures for Turing machines (Q2232614) (← links)
- A new Gaussian sampling for trapdoor lattices with arbitrary modulus (Q2329396) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- Efficient and fully secure lattice-based IBE with equality test (Q2673061) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Succinct LWE sampling, random polynomials, and obfuscation (Q2697860) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- Vector and functional commitments from lattices (Q2697903) (← links)
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography (Q2698337) (← links)
- Simulatable verifiable random function from the LWE assumption (Q2700784) (← links)
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information (Q2817818) (← links)
- Verifiable Pattern Matching on Outsourced Texts (Q2827727) (← links)
- FHE Circuit Privacy Almost for Free (Q2829211) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security (Q2829953) (← links)
- Multi-key Homomorphic Authenticators (Q2953787) (← links)
- On the (In)Security of SNARKs in the Presence of Oracles (Q3179354) (← links)
- Efficient Secure Multiparty Computation with Identifiable Abort (Q3179367) (← links)
- Delegating RAM Computations (Q3181023) (← links)
- Multi-key FHE from LWE, Revisited (Q3181028) (← links)
- Targeted Homomorphic Attribute-Based Encryption (Q3181032) (← links)
- Homomorphic Encryption (Q5021133) (← links)
- Constraining and Watermarking PRFs from Milder Assumptions (Q5041166) (← links)
- Cryptography with Updates (Q5738983) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918439) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918662) (← links)
- Multi-theorem preprocessing NIZKs from lattices (Q5918862) (← links)
- Adaptively secure MPC with sublinear communication complexity (Q5925696) (← links)