We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts Programmable hash functions, introduced by Hofheinz and Kiltz (Crypto 2008, Springer, 2008), with two main differences. First, an APHF works over bilinear groups, and it is asymmetric in the sense that, while only secretly computable, it admits an isomorphic copy which is publicly computable. Second, in addition to the usual programmability, APHFs may have an alternative property that we call programmable pseudorandomness. In a nutshell, this property states that it is possible to embed a pseudorandom value as part of the function?s output, akin to a random oracle. In spite of the apparent limitation of being only secretly computable, APHFs tu...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In a homomorphic signature scheme, a user Alice signs some large data x using her secret signing key...
We build the first unleveled fully homomorphic signature scheme in the standard model. Our scheme is...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
Abstract. We introduce the notion of asymmetric programmable hash functions (APHFs, for short), whic...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
We introduce two new cryptographic primitives: functional digital signatures and functional pseudora...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
Abstract. A homomorphic signature scheme for a class of functions C allows a client to sign and uplo...
In this thesis we introduce new primitives to authenticate computation on data expressed as elements...
One of the current challenges in cryptographic research is the development of advanced cryptographic...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In a homomorphic signature scheme, a user Alice signs some large data x using her secret signing key...
We build the first unleveled fully homomorphic signature scheme in the standard model. Our scheme is...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts P...
Abstract. We introduce the notion of asymmetric programmable hash functions (APHFs, for short), whic...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
We introduce two new cryptographic primitives: functional digital signatures and functional pseudora...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
Abstract. A homomorphic signature scheme for a class of functions C allows a client to sign and uplo...
In this thesis we introduce new primitives to authenticate computation on data expressed as elements...
One of the current challenges in cryptographic research is the development of advanced cryptographic...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In a homomorphic signature scheme, a user Alice signs some large data x using her secret signing key...
We build the first unleveled fully homomorphic signature scheme in the standard model. Our scheme is...