Candidate iO from homomorphic encryption schemes (Q2055602): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-45721-1_4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3012960191 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Bootstrapping with Polynomial Error / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Garble Arithmetic Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Obfuscation against Algebraic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Key-Dependent Message Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sum-of-squares meets program obfuscation, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Cryptomania to Obfustopia Through Secret-Key Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based FHE as secure as PKE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyses of Candidate Branching Program Obfuscators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sanitization of FHE Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Round Secure MPC from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower bounds on obfuscation from all-or-nothing encryption primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: When does functional encryption imply obfuscation? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Obfuscation in a Weak Multilinear Map Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable garbled circuits and succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707439 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH Map / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation with Non-trivial Efficiency / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic time-lock puzzles and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandomness of ring-LWE for any ring and modulus / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 09:44, 27 July 2024

scientific article
Language Label Description Also known as
English
Candidate iO from homomorphic encryption schemes
scientific article

    Statements

    Candidate iO from homomorphic encryption schemes (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    1 December 2021
    0 references
    0 references
    split fully-homomorphic encryption
    0 references
    linearly homomorphic encryption scheme
    0 references
    cryptographic hash function
    0 references
    FHE scheme
    0 references
    0 references
    0 references
    0 references
    0 references