搜索结果: 1-3 共查到“军事学 Homomorphic Authenticators”相关记录3条 . 查询时间(0.234 秒)
Function-Dependent Commitments from Homomorphic Authenticators
public-key cryptography Homomorphic Authenticators Commitments
2019/3/2
In cloud computing, delegated computing raises the security issue of guaranteeing data authenticity during a remote computation. In this context, the recently introduced function-dependent commitments...
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Delegated Computation Homomorphic Authenticators Context Hiding
2018/6/27
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When sensitive data is involve...
Multi-Key Homomorphic Authenticators
Homomorphic Signatures Digital Signatures Message Authentication Codes
2016/12/10
Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m1,...,mtm1,...,mt and outsource them, along with the corresponding authenticators, to an untrusted...