Pages that link to "Item:Q2826068"
From MaRDI portal
The following pages link to Targeted malleability: homomorphic encryption for restricted computations (Q2826068):
Displaying 14 items.
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Scalable zero knowledge via cycles of elliptic curves (Q1688401) (← links)
- The hunting of the SNARK (Q1698394) (← links)
- On succinct arguments and witness encryption from groups (Q2096510) (← links)
- On instantiating the algebraic group model from falsifiable assumptions (Q2119007) (← links)
- Succinct non-interactive arguments via linear interactive proofs (Q2136170) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- On the existence of extractable one-way functions (Q2829449) (← links)
- Spooky Encryption and Its Applications (Q2829944) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation (Q5270364) (← links)
- Chosen-Ciphertext Secure Fully Homomorphic Encryption (Q5738757) (← links)
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts (Q5738790) (← links)
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability (Q6636499) (← links)