User menu

Linearly homomorphic structure-preserving signatures and their applications

Bibliographic reference Libert, Benoît ; Peters, Thomas ; Joye, Marc ; Yung, Moti. Linearly homomorphic structure-preserving signatures and their applications. In: Designs, Codes and Cryptography, Vol. 77, no.2-3, p. 441-477 (01/10/2015)
Permanent URL http://hdl.handle.net/2078.1/170330
  1. Abe Masayuki, Fuchsbauer Georg, Groth Jens, Haralambiev Kristiyan, Ohkubo Miyako, Structure-Preserving Signatures and Commitments to Group Elements, Advances in Cryptology – CRYPTO 2010 (2010) ISBN:9783642146220 p.209-236, 10.1007/978-3-642-14623-7_12
  2. Abe M., Haralambiev K., Ohkubo M.: Signing on elements in bilinear groups for modular protocol design. Cryptology ePrint Archive Report 2010/133 (2010).
  3. Abe Masayuki, Groth Jens, Haralambiev Kristiyan, Ohkubo Miyako, Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups, Advances in Cryptology – CRYPTO 2011 (2011) ISBN:9783642227912 p.649-666, 10.1007/978-3-642-22792-9_37
  4. Abe Masayuki, Groth Jens, Ohkubo Miyako, Separating Short Structure-Preserving Signatures from Non-interactive Assumptions, Lecture Notes in Computer Science (2011) ISBN:9783642253843 p.628-646, 10.1007/978-3-642-25385-0_34
  5. Abe Masayuki, Chase Melissa, David Bernardo, Kohlweiss Markulf, Nishimaki Ryo, Ohkubo Miyako, Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions, Advances in Cryptology – ASIACRYPT 2012 (2012) ISBN:9783642349607 p.4-24, 10.1007/978-3-642-34961-4_3
  6. Abe Masayuki, Haralambiev Kristiyan, Ohkubo Miyako, Group to Group Commitments Do Not Shrink, Advances in Cryptology – EUROCRYPT 2012 (2012) ISBN:9783642290107 p.301-317, 10.1007/978-3-642-29011-4_19
  7. Abe Masayuki, David Bernardo, Kohlweiss Markulf, Nishimaki Ryo, Ohkubo Miyako, Tagged One-Time Signatures: Tight Security and Optimal Tag Size, Public-Key Cryptography – PKC 2013 (2013) ISBN:9783642363610 p.312-331, 10.1007/978-3-642-36362-7_20
  8. Ahn Jae Hyun, Boneh Dan, Camenisch Jan, Hohenberger Susan, shelat abhi, Waters Brent, Computing on Authenticated Data, Theory of Cryptography (2012) ISBN:9783642289132 p.1-20, 10.1007/978-3-642-28914-9_1
  9. Ateniese Giuseppe, Burns Randal, Curtmola Reza, Herring Joseph, Kissner Lea, Peterson Zachary, Song Dawn, Provable data possession at untrusted stores, 10.1145/1315245.1315318
  10. Ateniese Giuseppe, Kamara Seny, Katz Jonathan, Proofs of Storage from Homomorphic Identification Protocols, Advances in Cryptology – ASIACRYPT 2009 (2009) ISBN:9783642103650 p.319-333, 10.1007/978-3-642-10366-7_19
  11. Attrapadung Nuttapong, Libert Benoît, Homomorphic Network Coding Signatures in the Standard Model, Public Key Cryptography – PKC 2011 (2011) ISBN:9783642193781 p.17-34, 10.1007/978-3-642-19379-8_2
  12. Attrapadung Nuttapong, Libert Benoît, Peters Thomas, Computing on Authenticated Data: New Privacy Definitions and Constructions, Advances in Cryptology – ASIACRYPT 2012 (2012) ISBN:9783642349607 p.367-385, 10.1007/978-3-642-34961-4_23
  13. Attrapadung Nuttapong, Libert Benoît, Peters Thomas, Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures, Public-Key Cryptography – PKC 2013 (2013) ISBN:9783642363610 p.386-404, 10.1007/978-3-642-36362-7_24
  14. Bellare Mihir, Ristenpart Thomas, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.407-424, 10.1007/978-3-642-01001-9_24
  15. Boneh Dan, Boyen Xavier, Short Signatures Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.56-73, 10.1007/978-3-540-24676-3_4
  16. Boneh Dan, Boyen Xavier, Shacham Hovav, Short Group Signatures, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.41-55, 10.1007/978-3-540-28628-8_3
  17. Boneh Dan, Freeman David Mandell, Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures, Public Key Cryptography – PKC 2011 (2011) ISBN:9783642193781 p.1-16, 10.1007/978-3-642-19379-8_1
  18. Boneh Dan, Freeman David Mandell, Homomorphic Signatures for Polynomial Functions, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.149-168, 10.1007/978-3-642-20465-4_10
  19. Boneh Dan, Freeman David, Katz Jonathan, Waters Brent, Signing a Linear Subspace: Signature Schemes for Network Coding, Public Key Cryptography – PKC 2009 (2009) ISBN:9783642004674 p.68-87, 10.1007/978-3-642-00468-1_5
  20. Camenisch Jan, Groß Thomas, Heydt-Benjamin Thomas S., Rethinking accountable privacy supporting services : extended abstract, 10.1145/1456424.1456426
  21. Camenisch Jan, Haralambiev Kristiyan, Kohlweiss Markulf, Lapon Jorn, Naessens Vincent, Structure Preserving CCA Secure Encryption and Applications, Lecture Notes in Computer Science (2011) ISBN:9783642253843 p.89-106, 10.1007/978-3-642-25385-0_5
  22. Camenisch Jan, Dubovitskaya Maria, Haralambiev Kristiyan, Efficient Structure-Preserving Signature Scheme from Standard Assumptions, Lecture Notes in Computer Science (2012) ISBN:9783642329272 p.76-94, 10.1007/978-3-642-32928-9_5
  23. Canetti R., Universally composable security: a new paradigm for cryptographic protocols, 10.1109/sfcs.2001.959888
  24. Canetti Ran, Fischlin Marc, Universally Composable Commitments, Advances in Cryptology — CRYPTO 2001 (2001) ISBN:9783540424567 p.19-40, 10.1007/3-540-44647-8_2
  25. Canetti Ran, Dodis Yevgeniy, Pass Rafael, Walfish Shabsi, Universally Composable Security with Global Setup, Theory of Cryptography ISBN:9783540709350 p.61-85, 10.1007/978-3-540-70936-7_4
  26. Catalano Dario, Fiore Dario, Warinschi Bogdan, Adaptive Pseudo-free Groups and Applications, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.207-223, 10.1007/978-3-642-20465-4_13
  27. Catalano Dario, Fiore Dario, Warinschi Bogdan, Efficient Network Coding Signatures in the Standard Model, Public Key Cryptography – PKC 2012 (2012) ISBN:9783642300561 p.680-696, 10.1007/978-3-642-30057-8_40
  28. Catalano, D., Marcedone, A., Puglisi, O.: Authenticated computation on groups: new homomorphic primitives and applications. In: Advances in Cryptology—ASIACRYPT ’14. Lecture Notes in Computer Science, vol. 8874, Part II, pp. 193–212. Springer, Berlin (2014).
  29. Cathalo Julien, Libert Benoît, Yung Moti, Group Encryption: Non-interactive Realization in the Standard Model, Advances in Cryptology – ASIACRYPT 2009 (2009) ISBN:9783642103650 p.179-196, 10.1007/978-3-642-10366-7_11
  30. Chase Melissa, Kohlweiss Markulf, A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN, Lecture Notes in Computer Science (2012) ISBN:9783642329272 p.131-148, 10.1007/978-3-642-32928-9_8
  31. Cramer Ronald, Shoup Victor, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology — CRYPTO '98 (1998) ISBN:9783540648925 p.13-25, 10.1007/bfb0055717
  32. Damgard Ivan, Groth Jens, Non-interactive and reusable non-malleable commitment schemes, 10.1145/780542.780605
  33. Desmedt Yvo, Computer security by redefining what a computer is, 10.1145/283751.283834
  34. Di Crescenzo Giovanni, Ishai Yuval, Ostrovsky Rafail, Non-interactive and non-malleable commitment, 10.1145/276698.276722
  35. Dodis Yevgeniy, Shoup Victor, Walfish Shabsi, Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs, Lecture Notes in Computer Science ISBN:9783540851738 p.515-535, 10.1007/978-3-540-85174-5_29
  36. Dolev Danny, Dwork Cynthia, Naor Moni, Non-malleable cryptography, 10.1145/103418.103474
  37. Fischlin Marc, Libert Benoît, Manulis Mark, Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security, Lecture Notes in Computer Science (2011) ISBN:9783642253843 p.468-485, 10.1007/978-3-642-25385-0_25
  38. Freeman David Mandell, Improved Security for Linearly Homomorphic Signatures: A Generic Framework, Public Key Cryptography – PKC 2012 (2012) ISBN:9783642300561 p.697-714, 10.1007/978-3-642-30057-8_41
  39. Fuchsbauer G.: Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. Cryptology ePrint Archive Report 2009/320 (2009).
  40. Fujisaki Eiichiro, New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications, Lecture Notes in Computer Science (2012) ISBN:9783642279539 p.136-155, 10.1007/978-3-642-27954-6_9
  41. Garay Juan A., MacKenzie Philip, Yang Ke, Strengthening Zero-Knowledge Protocols Using Signatures, Lecture Notes in Computer Science (2003) ISBN:9783540140399 p.177-194, 10.1007/3-540-39200-9_11
  42. Gennaro Rosario, Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.220-236, 10.1007/978-3-540-28628-8_14
  43. Gennaro Rosario, Micali Silvio, Independent Zero-Knowledge Sets, Automata, Languages and Programming (2006) ISBN:9783540359074 p.34-45, 10.1007/11787006_4
  44. Gennaro Rosario, Gentry Craig, Parno Bryan, Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, Advances in Cryptology – CRYPTO 2010 (2010) ISBN:9783642146220 p.465-482, 10.1007/978-3-642-14623-7_25
  45. Gennaro Rosario, Katz Jonathan, Krawczyk Hugo, Rabin Tal, Secure Network Coding over the Integers, Public Key Cryptography – PKC 2010 (2010) ISBN:9783642130120 p.142-160, 10.1007/978-3-642-13013-7_9
  46. Groth Jens, Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures, Advances in Cryptology – ASIACRYPT 2006 (2006) ISBN:9783540494751 p.444-459, 10.1007/11935230_29
  47. Groth J.: Homomorphic trapdoor commitments to group elements. Cryptology ePrint Archive Report 2009/007 (2009).
  48. Groth Jens, Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments, Lecture Notes in Computer Science (2011) ISBN:9783642253843 p.431-448, 10.1007/978-3-642-25385-0_23
  49. Groth Jens, Ostrovsky Rafail, Cryptography in the Multi-string Model, Advances in Cryptology - CRYPTO 2007 ISBN:9783540741428 p.323-341, 10.1007/978-3-540-74143-5_18
  50. Groth Jens, Sahai Amit, Efficient Non-interactive Proof Systems for Bilinear Groups, Advances in Cryptology – EUROCRYPT 2008 ISBN:9783540789666 p.415-432, 10.1007/978-3-540-78967-3_24
  51. Hofheinz Dennis, Jager Tibor, Tightly Secure Signatures and Public-Key Encryption, Lecture Notes in Computer Science (2012) ISBN:9783642320088 p.590-607, 10.1007/978-3-642-32009-5_35
  52. Hofheinz Dennis, Kiltz Eike, Programmable Hash Functions and Their Applications, Lecture Notes in Computer Science ISBN:9783540851738 p.21-38, 10.1007/978-3-540-85174-5_2
  53. Johnson Robert, Molnar David, Song Dawn, Wagner David, Homomorphic Signature Schemes, Topics in Cryptology — CT-RSA 2002 (2002) ISBN:9783540432241 p.244-262, 10.1007/3-540-45760-7_17
  54. Jutla Charanjit S., Roy Arnab, Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces, Advances in Cryptology - ASIACRYPT 2013 (2013) ISBN:9783642420320 p.1-20, 10.1007/978-3-642-42033-7_1
  55. Jutla Charanjit S., Roy Arnab, Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces, Advances in Cryptology – CRYPTO 2014 (2014) ISBN:9783662443804 p.295-312, 10.1007/978-3-662-44381-1_17
  56. Libert B., Yung M.: Non-interactive CCA2-secure threshold cryptosystems with adaptive security: new framework and constructions. In: Proceedings of the Theory of Cryptography Conference—TCC ’12. Lecture Notes in Computer Science, vol. 7194, pp. 75–93. Springer, Berlin (2012).
  57. Libert Benoît, Peters Thomas, Joye Marc, Yung Moti, Linearly Homomorphic Structure-Preserving Signatures and Their Applications, Advances in Cryptology – CRYPTO 2013 (2013) ISBN:9783642400834 p.289-307, 10.1007/978-3-642-40084-1_17
  58. Libert B., Joye M., Yung M.: Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares. In: Proceedings of the ACM Symposium on Principles of Distributed Computing—PODC ’14, pp. 303–312. ACM Press, New York (2014).
  59. Libert Benoît, Joye Marc, Yung Moti, Peters Thomas, Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.1-21, 10.1007/978-3-662-45608-8_1
  60. Libert Benoît, Peters Thomas, Joye Marc, Yung Moti, Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.514-532, 10.1007/978-3-642-55220-5_29
  61. MacKenzie Philip, Yang Ke, On Simulation-Sound Trapdoor Commitments, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.382-400, 10.1007/978-3-540-24676-3_23
  62. Malkin Tal, Teranishi Isamu, Vahlis Yevgeniy, Yung Moti, Signatures Resilient to Continual Leakage on Memory and Computation, Theory of Cryptography (2011) ISBN:9783642195709 p.89-106, 10.1007/978-3-642-19571-6_7
  63. Naor M., Yung M., Public-key cryptosystems provably secure against chosen ciphertext attacks, 10.1145/100216.100273
  64. Nishimaki Ryo, Fujisaki Eiichiro, Tanaka Keisuke, A Multi-trapdoor Commitment Scheme from the RSA Assumption, Information Security and Privacy (2010) ISBN:9783642140808 p.182-199, 10.1007/978-3-642-14081-5_12
  65. Sakai Yusuke, Emura Keita, Hanaoka Goichiro, Kawai Yutaka, Matsuda Takahiro, Omote Kazumasa, Group Signatures with Message-Dependent Opening, Pairing-Based Cryptography – Pairing 2012 (2013) ISBN:9783642363337 p.270-294, 10.1007/978-3-642-36334-4_18
  66. Shamir A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology—Crypto ’84. Lecture Notes in Computer Science, vol. 196, pp. 47–53. Springer, Berlin (1984).
  67. Waters Brent, Efficient Identity-Based Encryption Without Random Oracles, Lecture Notes in Computer Science (2005) ISBN:9783540259107 p.114-127, 10.1007/11426639_7