Catalano et al., 2015 - Google Patents
Algebraic (trapdoor) one-way functions: Constructions and applications.Catalano et al., 2015
View PDF- Document ID
- 10572238930398428031
- Author
- Catalano D
- Fiore D
- Gennaro R
- Vamvourellis K
- Publication year
- Publication venue
- Theor. Comput. Sci.
External Links
Snippet
Algebraic one-way functions. This paper introduces the notion of Algebraic One-Way Function, which aims to capture and formalize many of the properties enjoyed by number- theoretic based one-way functions. Intuitively, an Algebraic One-Way Function (OWF) F …
- 238000010276 construction 0 abstract description 17
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hazay | Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs | |
Catalano et al. | Algebraic (trapdoor) one-way functions and their applications | |
Boneh et al. | Using level-1 homomorphic encryption to improve threshold DSA signatures for bitcoin wallet security | |
Bitansky et al. | From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again | |
Agrawal et al. | Round-optimal lattice-based threshold signatures, revisited | |
Fiore et al. | Publicly verifiable delegation of large polynomials and matrix computations, with applications | |
Benabbas et al. | Verifiable delegation of computation over large datasets | |
Micali et al. | Accountable-subgroup multisignatures | |
Fiore et al. | Efficiently verifiable computation on encrypted data | |
Lyubashevsky | Lattice-based identification schemes secure under active attacks | |
Sun et al. | Non-interactive multi-client searchable encryption: Realization and implementation | |
Camenisch et al. | Efficient blind signatures without random oracles | |
Goldwasser et al. | Delegation of computation without rejection problem from designated verifier CS-proofs | |
Lyubashevsky et al. | Man-in-the-middle secure authentication schemes from LPN and weak PRFs | |
Alkeilani Alkadri et al. | On lattice-based interactive protocols: an approach with less or no aborts | |
Boneh et al. | One-time and interactive aggregate signatures from lattices | |
Bouaziz-Ermann et al. | Lattice-based (partially) blind signature without restart | |
Li et al. | Privacy-preserving homomorphic MACs with efficient verification | |
Zhao et al. | Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing. | |
Alkadri et al. | Practical lattice-based distributed signatures for a small number of signers | |
Bansarkhani et al. | Direct anonymous attestation from lattices | |
Orrù | Revisiting keyed-verification anonymous credentials | |
Battagliola et al. | Enhancing threshold group action signature schemes: Adaptive security and scalability improvements | |
Luo et al. | A new constant-size group signature scheme from lattices | |
Catalano et al. | Algebraic (trapdoor) one-way functions: Constructions and applications. |