Craig Gentry

From MaRDI portal
Person:1688408

Available identifiers

zbMath Open gentry.craigDBLP28/2376WikidataQ19597281 ScholiaQ19597281MaRDI QIDQ1688408

List of research outcomes





PublicationDate of PublicationType
Achievable \textsf{CCA2} relaxation for homomorphic encryption2024-12-27Paper
Homomorphic encryption: a mathematical survey2024-03-20Paper
Achievable \textsf{CCA2} relaxation for homomorphic encryption2023-08-14Paper
Random-index PIR and applications2023-04-13Paper
Practical non-interactive publicly verifiable secret sharing with thousands of parties2022-08-30Paper
YOSO: You only speak once. Secure MPC with stateless ephemeral roles2022-04-22Paper
Can a public blockchain keep a secret?2021-12-01Paper
Homomorphic encryption for finite automata2020-05-05Paper
Compressible FHE with applications to PIR2020-04-30Paper
A unified framework for trapdoor-permutation-based sequential aggregate signatures2018-05-29Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input2018-01-05Paper
Computing on the edge of chaos: structure and randomness in encrypted computation2017-11-06Paper
Cryptanalyses of Candidate Branching Program Obfuscators2017-06-23Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-24Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-07Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits2016-07-04Paper
Functional encryption without obfuscation2016-04-08Paper
Private database access with HE-over-ORAM architecture2016-03-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
Graph-induced multilinear maps from lattices2015-07-06Paper
Fully homomorphic encryption using ideal lattices2015-02-04Paper
Optimizing ORAM and Using It Efficiently for Secure Computation2014-08-19Paper
Witness encryption and its applications2014-08-07Paper
Witness encryption from instance independent assumptions2014-08-07Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input2014-08-07Paper
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits2014-07-30Paper
(Leveled) fully homomorphic encryption without bootstrapping2014-07-01Paper
Separating succinct non-interactive arguments from all falsifiable assumptions2014-06-05Paper
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits2014-05-27Paper
Garbled RAM revisited2014-05-27Paper
Two-round secure MPC from indistinguishability obfuscation2014-02-18Paper
Private database queries using somewhat homomorphic encryption2014-01-24Paper
Discrete Gaussian leftover hash lemma over infinite domains2013-12-10Paper
Attribute-based encryption for circuits from multilinear maps2013-09-17Paper
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based2013-09-02Paper
Quadratic span programs and succinct NIZKs without PCPs2013-05-31Paper
Candidate Multilinear Maps from Ideal Lattices2013-05-31Paper
Packed ciphertexts in LWE-based homomorphic encryption2013-04-19Paper
Encrypted messages from the heights of cryptomania2013-03-18Paper
Ring switching in BGV-style homomorphic encryption2012-09-25Paper
Homomorphic evaluation of the AES circuit2012-09-25Paper
Better bootstrapping in fully homomorphic encryption2012-07-20Paper
Fully homomorphic encryption with polylog overhead2012-06-29Paper
Implementing Gentry's fully-homomorphic encryption scheme2011-05-27Paper
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits2010-08-24Paper
Non-interactive verifiable computing: outsourcing computation to untrusted workers2010-08-24Paper
Toward basing fully homomorphic encryption on worst-case hardness2010-08-24Paper
Computing arbitrary functions of encrypted data2010-07-14Paper
Fully homomorphic encryption over the integers2010-06-01Paper
A simple BGN-type cryptosystem from LWE2010-06-01Paper
The geometry of provable security: some proofs of security in which lattices make a surprise appearance2010-03-05Paper
Computing on Encrypted Data2009-11-26Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)2009-05-12Paper
Hierarchical Identity Based Encryption with Polynomially Many Levels2009-03-03Paper
New Multiparty Signature Schemes for Network Routing Applications2009-02-24Paper
Trapdoors for hard lattices and new cryptographic constructions2009-01-05Paper
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs2008-03-18Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys2008-03-17Paper
Practical Identity-Based Encryption Without Random Oracles2007-09-24Paper
A Method for Making Password-Based Key Exchange Resilient to Server Compromise2007-09-04Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security2006-10-16Paper
Automata, Languages and Programming2006-01-10Paper
Financial Cryptography and Data Security2005-12-22Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology - ASIACRYPT 20042005-08-12Paper
Advances in Cryptology - ASIACRYPT 20042005-06-14Paper
https://portal.mardi4nfdi.de/entity/Q47372532004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44741622004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348902003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348812003-11-26Paper
Hierarchical ID-Based Cryptography2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q27788492002-03-21Paper

Research outcomes over time

This page was built for person: Craig Gentry