Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Luca Nizzardo"'
Publikováno v:
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648336
ASIACRYPT (2)
ASIACRYPT (2)
Vector commitments with subvector openings (SVC) [Lai-Malavolta, Boneh-Bunz-Fisch; CRYPTO’19] allow one to open a committed vector at a set of positions with an opening of size independent of both the vector’s length and the number of opened posi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4aa731a9e023e04058467416377c5da
https://doi.org/10.1007/978-3-030-64834-3_1
https://doi.org/10.1007/978-3-030-64834-3_1
Publikováno v:
IET Information Security
Dario Fiore, Luca Nizzardo & Aikaterini Mitrokotsa 2019, ' Multi-key homomorphic authenticators ', IET Information Security, vol. 13, no. 6 . https://doi.org/10.1049/iet-ifs.2018.5341
Advances in Cryptology – ASIACRYPT 2016 ISBN: 9783662538890
ASIACRYPT (2)
Advances in Cryptology--CRYPTO 2016 | 22nd International Conference on the Theory and Application of Cryptology and Information Security | 04-08 Dic 2016 | Hanoi, Vietnam
Archivo Digital UPM
Universidad Politécnica de Madrid
Dario Fiore, Luca Nizzardo & Aikaterini Mitrokotsa 2019, ' Multi-key homomorphic authenticators ', IET Information Security, vol. 13, no. 6 . https://doi.org/10.1049/iet-ifs.2018.5341
Advances in Cryptology – ASIACRYPT 2016 ISBN: 9783662538890
ASIACRYPT (2)
Advances in Cryptology--CRYPTO 2016 | 22nd International Conference on the Theory and Application of Cryptology and Information Security | 04-08 Dic 2016 | Hanoi, Vietnam
Archivo Digital UPM
Universidad Politécnica de Madrid
Homomorphic authenticators HAs enable a client to authenticate a large collection of data elements $$m_1, \ldots , m_t$$ and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can gener
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::247e2347bceb2d2cb691c474fe8b1c8f
http://www.alexandria.unisg.ch/262150/
http://www.alexandria.unisg.ch/262150/
Publikováno v:
Design Codes and Cryptography, ISSN 0925-1022, 2017-12
Archivo Digital UPM
Universidad Politécnica de Madrid
Archivo Digital UPM
Universidad Politécnica de Madrid
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts Programmable hash functions, introduced by Hofheinz and Kiltz (Crypto 2008, Springer, 2008), with two main differences. First, an APHF works over bilin
Autor:
Luca Nizzardo
Publikováno v:
Archivo Digital UPM
Universidad Politécnica de Madrid
Universidad Politécnica de Madrid
Las interacciones sociales normalmente involucran personas con distintos intereses, incluso intereses contradictorios en algunas ocasiones, como por ejemplo, relaciones entre compradores y vendedores o entre consumidores y servicios. Tradicionalmente
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ac87f9e04000b1e0d71350cb6bbad167
https://oa.upm.es/51656/
https://oa.upm.es/51656/
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319933863
ACNS
ACNS
Homomorphic signature schemes allow anyone to perform computation on signed data in such a way that the correctness of computation’s results is publicly certified. In this work we analyze the security notions for this powerful primitive considered
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f8440befa17ec51a2de5296634b5d9e
https://doi.org/10.1007/978-3-319-93387-0_10
https://doi.org/10.1007/978-3-319-93387-0_10
Publikováno v:
CCS'17: proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security | Conference on Computer and Communications Security, CCS'17 | 30 Oct-03 Nov 2017 | Dallas, Estados Unidos
CCS
Archivo Digital UPM
instname
CCS
Archivo Digital UPM
instname
Zero Knowledge Contingent Payment (ZKCP) protocols allow fair exchange of sold goods and payments over the Bitcoin network. In this paper we point out two main shortcomings of current proposals for ZKCP, and propose ways to address them. First we sho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d9f1789c410588b3e00a1f3877aa17e5
http://oa.upm.es/49540/
http://oa.upm.es/49540/
Publikováno v:
Advances in Cryptology--CRYPTO 2015 | 35th Annual Cryptology Conference, CRYPTO 2015 | 16-20 Aug 2015 | Santa Barbara, CA, Estados Unidos
Archivo Digital UPM
Universidad Politécnica de Madrid
Lecture Notes in Computer Science ISBN: 9783662479995
CRYPTO (2)
Archivo Digital UPM
Universidad Politécnica de Madrid
Lecture Notes in Computer Science ISBN: 9783662479995
CRYPTO (2)
We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts Programmable Hash Functions, introduced by Hofheinz and Kiltz at Crypto 2008, with two main differences. First, an APHF works over bilinear groups, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fde5f67e4f5012ff5bb672dbc184ab87
http://hdl.handle.net/20.500.11769/85369
http://hdl.handle.net/20.500.11769/85369
Publikováno v:
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
Public Key Cryptography
Homomorphic MACs, introduced by Gennaro and Wichs in 2013, allow anyone to validate computations on authenticated data without knowledge of the secret key.Moreover, the secret-key owner can verify the validity of the computation without needing to kn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f7aebfec55adeb5975f44760f0d25477
https://doi.org/10.1007/978-3-642-54631-0_31
https://doi.org/10.1007/978-3-642-54631-0_31
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2022
Topics in Cryptology – CT-RSA 2022 ISBN: 9783030953119
Topics in Cryptology – CT-RSA 2022
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2022
Topics in Cryptology – CT-RSA 2022 ISBN: 9783030953119
Topics in Cryptology – CT-RSA 2022
Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and assumes the hardware to be trusted. Yet, there is an increasing concern on the trustworthiness of hardware components and embedded systems. A subverted
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::13f7dd3d6aac74efbca25ae52b73c0fa