Deco: Liberating web data using decentralized oracles for tls
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …
Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
On security in publish/subscribe services: A survey
C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …
modern large-scale mission-critical systems. Such systems are characterized by several non …
Homomorphic signatures for polynomial functions
D Boneh, DM Freeman - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
We construct the first homomorphic signature scheme that is capable of evaluating
multivariate polynomials on signed data. Given the public key and a signed data set, there is …
multivariate polynomials on signed data. Given the public key and a signed data set, there is …
Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of
which allows one to find arbitrary collisions in the domain of the function. In this paper, we …
which allows one to find arbitrary collisions in the domain of the function. In this paper, we …
Fully secure unbounded inner-product and attribute-based encryption
T Okamoto, K Takashima - International Conference on the Theory and …, 2012 - Springer
In this paper, we present the first inner-product encryption (IPE) schemes that are
unbounded in the sense that the public parameters do not impose additional limitations on …
unbounded in the sense that the public parameters do not impose additional limitations on …
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
D Boneh, DM Freeman - International Workshop on Public Key …, 2011 - Springer
We propose a linearly homomorphic signature scheme that authenticates vector subspaces
of a given ambient space. Our system has several novel properties not found in previous …
of a given ambient space. Our system has several novel properties not found in previous …
Building redactable consortium blockchain for industrial Internet-of-Things
Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-
Things devices is cost-effective. However, with an increase in computing power, some …
Things devices is cost-effective. However, with an increase in computing power, some …
Computing on authenticated data
In tandem with recent progress on computing on encrypted data via fully homomorphic
encryption, we present a framework for computing on authenticated data via the notion of …
encryption, we present a framework for computing on authenticated data via the notion of …
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects
HC Pöhls, V Angelakis, S Suppan… - 2014 IEEE wireless …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) provides a platform for the interconnection of a plethora of smart
objects. It has been widely accepted for providing Information and Communication …
objects. It has been widely accepted for providing Information and Communication …