Homomorphic signatures for polynomial functions

D Boneh, DM Freeman - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
We construct the first homomorphic signature scheme that is capable of evaluating
multivariate polynomials on signed data. Given the public key and a signed data set, there is …

Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures

D Boneh, DM Freeman - International Workshop on Public Key …, 2011 - Springer
We propose a linearly homomorphic signature scheme that authenticates vector subspaces
of a given ambient space. Our system has several novel properties not found in previous …

Computing on authenticated data

JH Ahn, D Boneh, J Camenisch, S Hohenberger… - Theory of Cryptography …, 2012 - Springer
In tandem with recent progress on computing on encrypted data via fully homomorphic
encryption, we present a framework for computing on authenticated data via the notion of …

Redactable signatures for tree-structured data: Definitions and constructions

C Brzuska, H Busch, O Dagdelen, M Fischlin… - … and Network Security …, 2010 - Springer
Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for
trees which support public redaction of subtrees (by third-party distributors) while pertaining …

Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys

N Fleischhacker, J Krupp, G Malavolta… - … -Key Cryptography–PKC …, 2016 - Springer
In a sanitizable signature scheme the signer allows a designated third party, called the
sanitizer, to modify certain parts of the message and adapt the signature accordingly …

[PDF][PDF] Edge Computing.

M Satyanarayanan - Computer, 2017 - usenix.org
Edge Computing Page 1 1 HotCloud-HotStorage Keynote July 11, 2017 © 2014-2017 M.
Satyanarayanan Edge Computing Vision and Challenges Mahadev Satyanarayanan School of …

Lightweight authentication scheme for data dissemination in cloud-assisted healthcare IoT

J Liu, J Yang, W Wu, X Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recent advancements in the Internet of Things (IoT) and cloud computing technologies have
accelerated the development of various practical applications, including healthcare systems …

Malleable signatures: New definitions and delegatable anonymous credentials

M Chase, M Kohlweiss, A Lysyanskaya… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
A signature scheme is malleable if, on input a message and a signature, it is possible to
efficiently compute a signature on a related message, for a transformation that is allowed …

Cost-effective authenticated data redaction with privacy protection in IoT

F Zhu, X Yi, A Abuadbba, I Khalil… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In a typical e-healthcare system, it is common for users' physiological data collected by
Internet-of-Things (IoT) devices to be processed and shared in a third-party environment. To …

A general framework for redactable signatures and new constructions

D Derler, HC Pöhls, K Samelin, D Slamanig - International Conference on …, 2015 - Springer
A redactable signature scheme (RSS RSS) allows removing parts of a signed message by
any party without invalidating the respective signature. State-of-the-art constructions thereby …