Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

Sok: Secure aggregation based on cryptographic schemes for federated learning

M Mansouri, M Önen, WB Jaballah… - Proceedings on Privacy …, 2023 - petsymposium.org
Secure aggregation consists of computing the sum of data collected from multiple sources
without disclosing these individual inputs. Secure aggregation has been found useful for …

An ID-based linearly homomorphic signature scheme and its application in blockchain

Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang - IEEE Access, 2018 - ieeexplore.ieee.org
Identity-based cryptosystems mean that public keys can be directly derived from user
identifiers, such as telephone numbers, email addresses, and social insurance number, and …

Leveled fully homomorphic signatures from standard lattices

S Gorbunov, V Vaikuntanathan, D Wichs - Proceedings of the forty …, 2015 - dl.acm.org
In a homomorphic signature scheme, a user Alice signs some large dataset x using her
secret signing key and uploads the signed data to an untrusted remote server. The server …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

Fully secure unbounded inner-product and attribute-based encryption

T Okamoto, K Takashima - International Conference on the Theory and …, 2012 - Springer
In this paper, we present the first inner-product encryption (IPE) schemes that are
unbounded in the sense that the public parameters do not impose additional limitations on …

Fully homomorphic message authenticators

R Gennaro, D Wichs - International Conference on the Theory and …, 2013 - Springer
We define and construct a new primitive called a fully homomorphic message authenticator.
With such scheme, anybody can perform arbitrary computations over authenticated data and …

Structure-preserving signatures on equivalence classes and constant-size anonymous credentials

G Fuchsbauer, C Hanser, D Slamanig - Journal of Cryptology, 2019 - Springer
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …

Quasi-adaptive NIZK for linear subspaces revisited

E Kiltz, H Wee - Annual International Conference on the Theory and …, 2015 - Springer
Non-interactive zero-knowledge (NIZK) proofs for algebraic relations in a group, such as the
Groth-Sahai proofs, are an extremely powerful tool in pairing-based cryptography. A series …

Practical homomorphic MACs for arithmetic circuits

D Catalano, D Fiore - Annual International Conference on the Theory and …, 2013 - Springer
Homomorphic message authenticators allow the holder of a (public) evaluation key to
perform computations over previously authenticated data, in such a way that the produced …