Sciweavers

341 search results - page 30 / 69
» Deniable Functional Encryption
Sort
View
116
Voted
EUROCRYPT
2011
Springer
14 years 2 months ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman
IACR
2011
104views more  IACR 2011»
13 years 10 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 2 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
99
Voted
IACR
2011
173views more  IACR 2011»
13 years 10 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz
ICISC
2007
77views Cryptology» more  ICISC 2007»
15 years 7 days ago
Improving Upon the TET Mode of Operation
Naor and Reingold had proposed the construction of a strong pseudo-random permutation (SPRP) by using a layer of ECB encryption between two layers of invertible block-wise universa...
Palash Sarkar