搜索结果: 1-15 共查到“军队指挥学 homomorphic signatures”相关记录17条 . 查询时间(0.046 秒)
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Anonymity random shuffling linearly-homomorphic signatures
2019/5/23
Anonymity is a primary ingredient for our digital life. Several tools have been designed to address it such as, for authentication, blind signatures, group signatures or anonymous credentials and, for...
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures Compiler
2018/6/25
Multi-Key Homomorphic Signatures (MKHS) enable clients in a system to sign and upload messages to an untrusted server. At any later point in time, the server can perform a computation CC on data provi...
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Delegated Computation Homomorphic Signatures Context-Hiding
2018/6/19
Sensitive data is often outsourced to cloud servers, with the server performing computation on the data. Computational correctness must be efficiently verifiable by a third party while the input data ...
An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both
digital signatures homomorphic signatures attribute-based signatures
2017/7/28
In Attribute-Based Signatures (ABS; first defined by Maji, Prabhakaran and Rosulek, CT-RSA 2011) an authority can generate multiple signing keys, where each key is associated with an attribute xx. Mes...
On the Security Notions for Homomorphic Signatures
Digital Signatures Homomorphic Signatures Security Notions
2017/1/3
Homomorphic signature schemes allow anyone to perform computation on signed data in such a way that the correctness of computation’s results is publicly certified. In this work we analyze the security...
Key-Homomorphic Signatures and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
key-homomorphic signatures ring signatures (universal) designated verifier signatures
2016/12/10
Key-homomorphic properties of cryptographic objects have proven to be useful, both from a theoretical as well as a practical perspective. Important cryptographic objects such as pseudorandom functions...
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism
foundations digital signatures
2016/12/10
Homomorphic signatures (HS) allow evaluation of signed messages by producing a signature on a function of messages signed by the same key. Motivated by the vast potential of applications, we initiate ...
In a homomorphic signature scheme, given a vector of signatures σ⃗ corresponding to a dataset of messages μ⃗ , there is a {\it public} algorithm that allows to derive a signature σ′ for m...
Homomorphic Signatures with Efficient Verification for Polynomial Functions
homomorphic signatures verifiable computation
2016/1/9
A homomorphic signature scheme for a class of functions C
allows a client to sign and upload elements of some data set D on a
server. At any later point, the server can derive a (publicly verifiable...
Leveled Fully Homomorphic Signatures from Standard Lattices
Homomorphic Signatures Lattices Outsourcing Computation
2016/1/6
In a homomorphic signature scheme, a user Alice signs some large dataset x using her secret
signing key and uploads the signed data to an untrusted remote server. The server can then run
some comput...
Adaptively Secure Fully Homomorphic Signatures Based on Lattices
Homomorphic Signatures Lattices
2016/1/6
In a homomorphic signature scheme, given the public key and a vector of signatures σ⃗ :=(σ1,…,σl) over l messages μ⃗ :=(μ1,…,μl), there exists an efficient algorithm to produce a signature...
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Public-Key Cryptography Programmable Hash Functions Digital Signatures
2015/12/23
We introduce the notion of asymmetric programmable hash functions (APHFs, for short),
which adapts Programmable Hash Functions, introduced by Hofheinz and Kiltz at Crypto 2008, with
two main differe...
Online-Offline Homomorphic Signatures for Polynomial Functions
Homomorphic Signatures Online-Offline Signatures
2015/12/22
The advent of cloud computing has given rise to a plethora of work
on verifiable delegation of computation. Homomorphic signatures are a powerful
tool that can be tailored for verifiable computation...
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
simulation-soundness chosen-ciphertext security
2014/3/6
Verifiability is central to building protocols and systems with integrity. Initially, efficient methods employed the Fiat-Shamir heuristics. Since 2008, the Groth-Sahai techniques have been the most e...
Homomorphic Signatures for Polynomial Functions
public-key cryptography / homomorphic signatures ideals lattices
2012/3/30
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an efficient algorithm t...