Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Receipt-free secret-ballot elections (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4432349 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840086 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Delegation of Computation Using Fully Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-Authority Secret-Ballot Elections with Linear Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035738 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314356 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Gentry’s Fully-Homomorphic Encryption Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology – Mycrypt 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Zaps and New Techniques for NIZK / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hybrid Encryption from Weakened Key Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The theory of finite groups. An introduction. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2770573 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the CCA1-Security of Elgamal and Damgård’s Elgamal / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious Polynomial Evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249647 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption with CCA Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption over the Integers / rank
 
Normal rank

Latest revision as of 08:35, 6 July 2024

scientific article
Language Label Description Also known as
English
Group homomorphic encryption: characterizations, impossibility results, and applications
scientific article

    Statements

    Group homomorphic encryption: characterizations, impossibility results, and applications (English)
    0 references
    0 references
    0 references
    0 references
    3 April 2013
    0 references
    foundations
    0 references
    homomorphic encryption
    0 references
    public-key cryptography
    0 references
    IND-CCA1 security
    0 references
    subgroup membership problem
    0 references
    \(k\)-linear problem
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers