Functional Commitments (FC) allow one to reveal functions of committed data in a succinct and verifiable way. In this paper we put forward the notion of additive-homomorphic FC and …
J Zhang, Y Chen, Z Zhang - Annual international cryptology conference, 2016 - Springer
Driven by the open problem raised by Hofheinz and Kiltz 34, we study the formalization of lattice-based programmable hash function (PHF), and give two types of constructions by …
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m_1, ..., m_t and outsource them, along with the corresponding authenticators, to …
M Zhao, C Hu, X Song, C Zhao - Journal of Network and Computer …, 2019 - Elsevier
Cloud computing provides the clients with diversified services in a flexible manner. Recently, the cloud platforms have been the basic underling-support for The IoT and mobile …
In a non-interactive zero-knowledge (NIZK) proof, a prover can non-interactively convince a verifier of a statement without revealing any additional information. Thus far, numerous …
R Gay, B Ursu - IACR International Conference on Public-Key …, 2024 - Springer
We build the first unleveled fully homomorphic signature scheme in the standard model. Our scheme is not constrained by any a-priori bound on the depth of the functions that can be …
T Jager, R Kurek, D Niehues - IACR International Conference on Public …, 2021 - Springer
We construct more efficient cryptosystems with provable security against adaptive attacks, based on simple and natural hardness assumptions in the standard model. Concretely, we …
D Fiore, I Tucker - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
We study the problem of privacy-preserving proofs on streamed authenticated data. In this setting, a server receives a continuous stream of data from a trusted data provider, and is …
L Schabhüser, D Butin, J Buchmann - Topics in Cryptology–CT-RSA 2019 …, 2019 - Springer
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When …