Sciweavers

Share
27 search results - page 1 / 6
» Constructing List Homomorphisms from Proofs
Sort
View
APLAS
2011
ACM
7 years 7 months ago
Constructing List Homomorphisms from Proofs
The well-known third list homomorphism theorem states that if a function h is both an instance of foldr and foldl, it is a list homomorphism. Plenty of previous works devoted to co...
Yun-Yan Chi, Shin-Cheng Mu
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
9 years 7 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
ASIACRYPT
2009
Springer
8 years 11 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
TCC
2016
Springer
54views Cryptology» more  TCC 2016»
3 years 3 months ago
Multilinear Maps from Obfuscation
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known...
Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz...
IACR
2016
50views Biometrics» more  IACR 2016»
3 years 3 months ago
An Alternative View of the Graph-Induced Multilinear Maps
In this paper, we view multilinear maps through the lens of “homomorphic obfuscation”. In specific, we show how to homomorphically obfuscate the kernel-test and affine subsp...
Yilei Chen
books