Deco: Liberating web data using decentralized oracles for tls

F Zhang, D Maram, H Malvai, S Goldfeder… - Proceedings of the 2020 …, 2020 - dl.acm.org
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …

Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based

D Derler, K Samelin, D Slamanig… - Cryptology ePrint …, 2019 - eprint.iacr.org
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …

On security in publish/subscribe services: A survey

C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …

Homomorphic signatures for polynomial functions

D Boneh, DM Freeman - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
We construct the first homomorphic signature scheme that is capable of evaluating
multivariate polynomials on signed data. Given the public key and a signed data set, there is …

Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures

J Camenisch, D Derler, S Krenn, HC Pöhls… - … -Key Cryptography–PKC …, 2017 - Springer
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of
which allows one to find arbitrary collisions in the domain of the function. In this paper, we …

Fully secure unbounded inner-product and attribute-based encryption

T Okamoto, K Takashima - International Conference on the Theory and …, 2012 - Springer
In this paper, we present the first inner-product encryption (IPE) schemes that are
unbounded in the sense that the public parameters do not impose additional limitations on …

Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures

D Boneh, DM Freeman - International Workshop on Public Key …, 2011 - Springer
We propose a linearly homomorphic signature scheme that authenticates vector subspaces
of a given ambient space. Our system has several novel properties not found in previous …

Building redactable consortium blockchain for industrial Internet-of-Things

K Huang, X Zhang, Y Mu, X Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-
Things devices is cost-effective. However, with an increase in computing power, some …

Computing on authenticated data

JH Ahn, D Boneh, J Camenisch, S Hohenberger… - Theory of Cryptography …, 2012 - Springer
In tandem with recent progress on computing on encrypted data via fully homomorphic
encryption, we present a framework for computing on authenticated data via the notion of …

RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects

HC Pöhls, V Angelakis, S Suppan… - 2014 IEEE wireless …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) provides a platform for the interconnection of a plethora of smart
objects. It has been widely accepted for providing Information and Communication …