Homomorphic Encryption (Q5021133): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-57048-8_5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4251546625 / rank
 
Normal rank
Property / cites work
 
Property / cites work: More on average case vs approximation complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Bootstrapping in Quasilinear Time / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Bootstrapping with Polynomial Error / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Algorithms for Learning in Presence of Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded-width polynomial-size branching programs recognize exactly those languages in \(NC^ 1\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4432349 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP / rank
 
Normal rank
Property / cites work
 
Property / cites work: When Homomorphism Becomes a Liability / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical hardness of learning with errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based FHE as secure as PKE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250776 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Definitions and Separations for Circular Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private information retrieval / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-identity and Multi-key Leveled FHE from Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption over the Integers with Shorter Public Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374904 / rank
 
Normal rank
Property / cites work
 
Property / cites work: FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sanitization of FHE Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314356 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Gentry’s Fully-Homomorphic Encryption Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Bootstrapping in Fully Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption with Polylog Overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Evaluation of the AES Circuit / rank
 
Normal rank
Property / cites work
 
Property / cites work: i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple BGN-Type Cryptosystem from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Run Turing Machines on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption for Circuits from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveled Fully Homomorphic Signatures from Standard Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms in HElib / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bootstrapping for HElib / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Pseudorandom Generator from any One-way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840170 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evaluating Branching Programs on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4385522 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate encryption supporting disjunctions, polynomial equations, and inner products / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Survey on Polly Cracker Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Additively Homomorphic Encryption with d-Operand Multiplications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst‐Case to Average‐Case Reductions Based on Gaussian Measures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two Round Multiparty Computation via Multi-key FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Survey of Single-Database Private Information Retrieval: Techniques and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Maliciously Circuit-Private FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key FHE from LWE, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption: From Private-Key to Public-Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic SIMD operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Blindfolded: New Developments in Fully Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption over the Integers / rank
 
Normal rank

Latest revision as of 16:43, 27 July 2024

scientific article; zbMATH DE number 7455967
Language Label Description Also known as
English
Homomorphic Encryption
scientific article; zbMATH DE number 7455967

    Statements

    Homomorphic Encryption (English)
    0 references
    0 references
    12 January 2022
    0 references
    encryption scheme
    0 references
    encrypt data
    0 references
    homomorphic encryption
    0 references
    private information retrieval
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers