Results 1  10
of
297
Linearly Homomorphic StructurePreserving Signatures and their Applications
, 2013
"... Structurepreserving signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools ..."
Abstract

Cited by 10 (4 self)
 Add to MetaCart
cleartext storage). Then, we give a generic construction of nonmalleable (and actually simulationsound) commitment from any linearly homomorphic SPS. This notably provides the first constantsize nonmalleable commitment to group elements.
Generalizing Homomorphic MACs for Arithmetic Circuits?
"... Abstract. Homomorphic MACs, introduced by Gennaro and Wichs in 2013, allow anyone to validate computations on authenticated data without knowledge of the secret key. Moreover, the secretkey owner can verify the validity of the computation without needing to know the original (authenticated) input ..."
Abstract
 Add to MetaCart
Abstract. Homomorphic MACs, introduced by Gennaro and Wichs in 2013, allow anyone to validate computations on authenticated data without knowledge of the secret key. Moreover, the secretkey owner can verify the validity of the computation without needing to know the original (authenticated
Proofs of Storage from Homomorphic Identification Protocols
"... Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constructed from any homomorphic linear authenticator (HLA). The latter, roughly speaking, are signature/message authentication ..."
Abstract

Cited by 66 (3 self)
 Add to MetaCart
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constructed from any homomorphic linear authenticator (HLA). The latter, roughly speaking, are signature/message authentication
Linearly Homomorphic Encryption from DDH
, 2015
"... We design a linearly homomorphic encryption scheme whose security relies on the hardness of the decisional DiffieHellman problem. Our approach requires some special features of the underlying group. In particular, its order is unknown and it contains a subgroup in which the discrete logarithm pro ..."
Abstract
 Add to MetaCart
problem is tractable. Therefore, our instantiation holds in the class group of a non maximal order of an imaginary quadratic field. Its algebraic structure makes it possible to obtain such a linearly homomorphic scheme whose message space is the whole set of integers modulo a prime p and which supports
PrivacyPreserving Public Auditing In Cloud Storage Security
"... computing utility, ondemand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under differ ..."
Abstract

Cited by 4 (0 self)
 Add to MetaCart
privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacypreserving public auditing. We utilize the homomorphic non linear authenticator and random masking to guarantee that the TPA would not learn any knowledge about the data
Homomorphisms of Abelian varieties
 J. REINE ANGEW. MATH
, 1998
"... It is wellknown that an abelian variety is (absolutely) simple or is isogenous to a selfproduct of an (absolutely) simple abelian variety if and only if the center of its endomorphism algebra is a field. In this paper we prove that the center is a field if the field of definition of points of prim ..."
Abstract

Cited by 28 (7 self)
 Add to MetaCart
properties for two abelian varieties X and Y combined with the linear disjointness of the corresponding fields of definitions of points of order ℓ imply that X and Y are nonisogenous (and even Hom(X, Y) = 0). In §3 we give applications to endomorphism algebras of hyperelliptic jacobians. In §4 we prove
NonLinear Variance Reduction Techniques in Biometric Authentication
 In Workshop on Multimodal User Authentication (MMUA 2003
, 2003
"... In this paper, several approaches that can be used to improve biometric authentication applications are proposed. The idea is inspired by the ensemble approach, i.e., the use of several classifiers to solve a problem. Compared to using only one classifier, the ensemble of classifiers has the advanta ..."
Abstract

Cited by 28 (21 self)
 Add to MetaCart
In this paper, several approaches that can be used to improve biometric authentication applications are proposed. The idea is inspired by the ensemble approach, i.e., the use of several classifiers to solve a problem. Compared to using only one classifier, the ensemble of classifiers has
Key Homomorphic PRFs and Their Applications∗
, 2014
"... A pseudorandom function F: K ×X → Y is said to be key homomorphic if given F (k1, x) and F (k2, x) there is an efficient algorithm to compute F (k1 ⊕ k2, x), where ⊕ denotes a group operation on k1 and k2 such as xor. Key homomorphic PRFs are natural objects to study and have a number of interesting ..."
Abstract

Cited by 10 (1 self)
 Add to MetaCart
secure in the random oracle model. We construct the first provably secure key homomorphic PRFs in the standard model. Our main construction is based on the learning with errors (LWE) problem. In the proof of security we need a variant of LWE where query points are nonuniform and we show
CHARACTERIZATIONS AND AUTOMATIC LINEARITY FOR RING HOMOMORPHISMS ON ALGEBRAS OF FUNCTIONS
"... Abstract. Automatic linearity results for certain ring homomorphisms between two algebras, in particular, semisimple commutative Banach algebras with units are proved. For this purpose a representation by using the induced continuous mapping between the maximal ideal spaces and ring homomorphisms ..."
Abstract
 Add to MetaCart
Abstract. Automatic linearity results for certain ring homomorphisms between two algebras, in particular, semisimple commutative Banach algebras with units are proved. For this purpose a representation by using the induced continuous mapping between the maximal ideal spaces and ring homomorphisms
Homomorphic Images And Related Topics
, 2015
"... We will explore progenitors extensively throughout this project. The progenitor, developed by Robert T Curtis, is a special type of infinite group formed by a semidirect product of a free group m∗n and a transitive permutation group of degree n. Since progenitors are infinite, we add necessary rela ..."
Abstract
 Add to MetaCart
relations to produce finite homomorphic images. Curtis proved that any nonabelian simple group is a homomorphic image of a progenitor of the form 2∗n: N. In particular, we will investigate progenitors that generate two of the Mathieu sporadic groups, M11 and M22, as well as some classical groups. We
Results 1  10
of
297