Sciweavers

7 search results - page 2 / 2
» TCC 2012
Sort
View
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 1 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
11 years 8 months ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy