all InfoSec news
Implementation and Performance Analysis of Homomorphic Signature Schemes
April 29, 2024, 11:48 a.m. |
IACR News www.iacr.org
ePrint Report: Implementation and Performance Analysis of Homomorphic Signature Schemes
Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta
Homomorphic signatures allow to validate computation on signed data. Alice, holding a dataset, $\{m_1 , \ldots , m_t \}$ uses her secret key $\sf sk$ to sign these data and stores the authenticated dataset on a remote server. The server can later (publicly) compute $m = f(m_1,...,m_t)$ together with a signature $\sigma$ certifying that $m$ is indeed the correct output of …
alice analysis computation data dataset eprint report implementation key mario performance report secret secret key sign signature signatures stores
More from www.iacr.org / IACR News
A Deniability Analysis of Signal's Initial Handshake PQXDH
1 day, 5 hours ago |
www.iacr.org
BGJ15 Revisited: Sieving with Streamed Memory Access
1 day, 5 hours ago |
www.iacr.org
Quantum Key-Revocable Dual-Regev Encryption, Revisited
1 day, 5 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Consultant/Senior Consultant – Categoria Protetta L. 68/99
@ BIP | Italy
SoC Security Architect, Platform Architecture
@ Apple | San Diego, California, United States
Cloud Engineer II- SOC Analyst
@ Insight Enterprises, Inc. | Gurugram Gurgaon HR, IN