Leveled fully homomorphic signatures from standard lattices

S Gorbunov, V Vaikuntanathan, D Wichs - Proceedings of the forty …, 2015 - dl.acm.org
In a homomorphic signature scheme, a user Alice signs some large dataset x using her
secret signing key and uploads the signed data to an untrusted remote server. The server …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

Fully secure unbounded inner-product and attribute-based encryption

T Okamoto, K Takashima - International Conference on the Theory and …, 2012 - Springer
In this paper, we present the first inner-product encryption (IPE) schemes that are
unbounded in the sense that the public parameters do not impose additional limitations on …

Fully homomorphic message authenticators

R Gennaro, D Wichs - International Conference on the Theory and …, 2013 - Springer
We define and construct a new primitive called a fully homomorphic message authenticator.
With such scheme, anybody can perform arbitrary computations over authenticated data and …

Structure-preserving signatures on equivalence classes and constant-size anonymous credentials

G Fuchsbauer, C Hanser, D Slamanig - Journal of Cryptology, 2019 - Springer
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …

Quasi-adaptive NIZK for linear subspaces revisited

E Kiltz, H Wee - Annual International Conference on the Theory and …, 2015 - Springer
Non-interactive zero-knowledge (NIZK) proofs for algebraic relations in a group, such as the
Groth-Sahai proofs, are an extremely powerful tool in pairing-based cryptography. A series …

Practical homomorphic MACs for arithmetic circuits

D Catalano, D Fiore - Annual International Conference on the Theory and …, 2013 - Springer
Homomorphic message authenticators allow the holder of a (public) evaluation key to
perform computations over previously authenticated data, in such a way that the produced …

Secure cloud storage meets with secure network coding

F Chen, T Xiang, Y Yang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper reveals an intrinsic relationship between secure cloud storage and secure
network coding for the first time. Secure cloud storage was proposed only recently while …

Homomorphic signatures with efficient verification for polynomial functions

D Catalano, D Fiore, B Warinschi - Annual Cryptology Conference, 2014 - Springer
A homomorphic signature scheme for a class of functions C allows a client to sign and
upload elements of some data set D on a server. At any later point, the server can derive a …