A comprehensive review on collision-resistant hash functions on lattices

N Mishra, SKH Islam, S Zeadally - Journal of Information Security and …, 2021 - Elsevier
Hash functions have always attracted a lot of attention in modern cryptography because of
their hard to invert nature. However, all previous constructions of cryptographic primitives …

Additive-homomorphic functional commitments and applications to homomorphic signatures

D Catalano, D Fiore, I Tucker - … Conference on the Theory and Application …, 2022 - Springer
Functional Commitments (FC) allow one to reveal functions of committed data in a succinct
and verifiable way. In this paper we put forward the notion of additive-homomorphic FC and …

Programmable hash functions from lattices: short signatures and IBEs with small key sizes

J Zhang, Y Chen, Z Zhang - Annual international cryptology conference, 2016 - Springer
Driven by the open problem raised by Hofheinz and Kiltz 34, we study the formalization of
lattice-based programmable hash function (PHF), and give two types of constructions by …

Multi-key homomorphic authenticators

D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin - International conference on …, 2016 - Springer
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data
elements m_1, ..., m_t and outsource them, along with the corresponding authenticators, to …

Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial

M Zhao, C Hu, X Song, C Zhao - Journal of Network and Computer …, 2019 - Elsevier
Cloud computing provides the clients with diversified services in a flexible manner. Recently,
the cloud platforms have been the basic underling-support for The IoT and mobile …

Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions

S Katsumata, R Nishimaki, S Yamada… - Advances in Cryptology …, 2019 - Springer
In a non-interactive zero-knowledge (NIZK) proof, a prover can non-interactively convince a
verifier of a statement without revealing any additional information. Thus far, numerous …

On instantiating unleveled fully-homomorphic signatures from falsifiable assumptions

R Gay, B Ursu - IACR International Conference on Public-Key …, 2024 - Springer
We build the first unleveled fully homomorphic signature scheme in the standard model. Our
scheme is not constrained by any a-priori bound on the depth of the functions that can be …

Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance

T Jager, R Kurek, D Niehues - IACR International Conference on Public …, 2021 - Springer
We construct more efficient cryptosystems with provable security against adaptive attacks,
based on simple and natural hardness assumptions in the standard model. Concretely, we …

Efficient zero-knowledge proofs on signed data with applications to verifiable computation on data streams

D Fiore, I Tucker - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
We study the problem of privacy-preserving proofs on streamed authenticated data. In this
setting, a server receives a continuous stream of data from a trusted data provider, and is …

Context hiding multi-key linearly homomorphic authenticators

L Schabhüser, D Butin, J Buchmann - Topics in Cryptology–CT-RSA 2019 …, 2019 - Springer
Demanding computations are increasingly outsourced to cloud platforms. For such
outsourced computations, the efficient verifiability of results is a crucial requirement. When …