The following pages link to Multi-key FHE from LWE, Revisited (Q3181028):
Displaying 19 items.
- Two-round adaptively secure multiparty computation from standard assumptions (Q1629408) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE (Q2001181) (← links)
- Post-quantum multi-party computation (Q2056694) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- BETA: biometric-enabled threshold authentication (Q2061958) (← links)
- Three-round secure multiparty computation from black-box two-round oblivious transfer (Q2128560) (← links)
- From FE combiners to secure MPC and back (Q2175912) (← links)
- Spooky Encryption and Its Applications (Q2829944) (← links)
- Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts (Q2835588) (← links)
- Multikey Fully Homomorphic Encryption and Applications (Q4599146) (← links)
- (Q5002694) (← links)
- Homomorphic Encryption (Q5021133) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping (Q6132971) (← links)
- A practical TFHE-based multi-key homomorphic encryption with linear complexity and low noise growth (Q6550607) (← links)
- Towards practical multi-key TFHE: parallelizable, key-compatible, quasi-linear complexity (Q6635903) (← links)
- Attribute-based keyed fully homomorphic encryption (Q6660543) (← links)