Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Linearly Homomorphic Encryption from $$\mathsf {DDH}$$ - MaRDI portal

Linearly Homomorphic Encryption from $$\mathsf {DDH}$$

From MaRDI portal
Publication:2790061

DOI10.1007/978-3-319-16715-2_26zbMath1382.94080OpenAlexW301822183MaRDI QIDQ2790061

Fabien Laguillaumie, Guilhem Castagnos

Publication date: 2 March 2016

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_26




Related Items (26)

A tighter proof for CCA secure inner product functional encryption: genericity meets efficiencyRound-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard ModelNew Ideas to Build Noise-Free Homomorphic CryptosystemsTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelOne-more unforgeability of blind ECDSASecure multiparty computation with free branchingPromise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class GroupsZero-knowledge arguments for subverted RSA groupsMulti-signatures for ECDSA and its applications in blockchainOn Constructing Pairing-Free Identity-Based EncryptionsI want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groupsThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)MyOPE: malicious security for oblivious polynomial evaluationTowards practical topology-hiding computationHomomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomialsAn algebraic framework for silent preprocessing with trustless setup and active securityThe special case of cyclotomic fields in quantum algorithms for unit groupsSecure multiparty computation from threshold encryption based on class groupsPractical fully secure unrestricted inner product functional encryption modulo \(p\)Homomorphic secret sharing for low degree polynomialsAn applications of signed quadratic residues in public key cryptographyLinearly Homomorphic Encryption from $$\mathsf {DDH}$$Bandwidth-efficient threshold EC-DSACompact zero-knowledge proofs for threshold ECDSA with trustless setupA geometric approach to homomorphic secret sharingBandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security



Cites Work


This page was built for publication: Linearly Homomorphic Encryption from $$\mathsf {DDH}$$