Pages that link to "Item:Q5172710"
From MaRDI portal
The following pages link to Fully homomorphic encryption using ideal lattices (Q5172710):
Displaying 50 items.
- (Leveled) Fully Homomorphic Encryption without Bootstrapping (Q92720) (← links)
- Polly cracker, revisited (Q285245) (← links)
- On the existence of provably secure cloud computing systems (Q309152) (← links)
- Homomorphic AES evaluation using the modified LTV scheme (Q310240) (← links)
- A thirty year old conjecture about promise problems (Q347124) (← links)
- An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud (Q355501) (← links)
- A new definition of homomorphic signature for identity management in mobile cloud computing (Q389372) (← links)
- Privacy and verifiability in voting systems: methods, developments and trends (Q395657) (← links)
- Discrete logarithm based additively homomorphic encryption and secure data aggregation (Q433021) (← links)
- Cloud computing in cryptography and steganography (Q466404) (← links)
- Symmetric quantum fully homomorphic encryption with perfect security (Q479359) (← links)
- Quantum fully homomorphic encryption scheme based on universal quantum circuit (Q496935) (← links)
- LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme (Q498985) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Algebraic (trapdoor) one-way functions: constructions and applications (Q500981) (← links)
- Secure multiparty computation of solid geometric problems and their applications (Q507770) (← links)
- Efficient computation outsourcing for inverting a class of homomorphic functions (Q508607) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Restricted adaptive oblivious transfer (Q650878) (← links)
- Efficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based service (Q680776) (← links)
- Cryptanalysis of a homomorphic encryption scheme (Q680918) (← links)
- Searchable symmetric encryption over multiple servers (Q680933) (← links)
- Trusted computing with addition machines. I (Q681716) (← links)
- Security and privacy aspects in MapReduce on clouds: a survey (Q739007) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- A new scale-invariant homomorphic encryption scheme (Q781008) (← links)
- Dual lattice attacks for closest vector problems (with preprocessing) (Q826277) (← links)
- Finding shortest lattice vectors faster using quantum search (Q887421) (← links)
- PASS-encrypt: a public key cryptosystem based on partial evaluation of polynomials (Q887439) (← links)
- Secret computation of purchase history data using somewhat homomorphic encryption (Q890595) (← links)
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs (Q901372) (← links)
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Some basics on privacy techniques, anonymization and their big data challenges (Q1616158) (← links)
- Lattice-based key exchange on small integer solution problem (Q1616180) (← links)
- Information security protocol based system identification with binary-valued observations (Q1621182) (← links)
- Fine-grained secure computation (Q1631318) (← links)
- Lattice-based certificateless encryption scheme (Q1633051) (← links)
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model (Q1633458) (← links)
- Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing scheme (Q1637704) (← links)
- Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm (Q1643980) (← links)
- Practical private-key fully homomorphic encryption in rings (Q1647860) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Homomorphic lower digits removal and improved FHE bootstrapping (Q1648799) (← links)
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data (Q1648801) (← links)
- Bootstrapping for approximate homomorphic encryption (Q1648805) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- A compressive privacy approach to generalized information bottleneck and privacy funnel problems (Q1661460) (← links)
- The hunting of the SNARK (Q1698394) (← links)
- Fixed-point arithmetic in SHE schemes (Q1698658) (← links)