Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness

From MaRDI portal
Revision as of 02:59, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3582751

DOI10.1007/978-3-642-14623-7_7zbMath1280.94059OpenAlexW1509320652MaRDI QIDQ3582751

Craig Gentry

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_7




Related Items (55)

Lattice-based key exchange on small integer solution problemLattice-based certificateless encryption schemePrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesCryptanalysis of a Homomorphic Encryption Scheme Over IntegersDeterministic compression with uncertain priorsLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsBenaloh’s Dense Probabilistic Encryption RevisitedCRT-based fully homomorphic encryption over the integersShort Generators Without Quantum Computers: The Case of MultiquadraticsOn the structure of Boolean functions with small spectral normThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsDecompositions of Triangle-Dense GraphsThe Geometry of Lattice CryptographyGeneralized Learning Problems and Applications to Non-commutative CryptographyAccumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computationRandom self-reducibility of ideal-SVP via Arakelov random walks




This page was built for publication: Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness