Craig Gentry

From MaRDI portal
Person:1688408


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Achievable \textsf{CCA2} relaxation for homomorphic encryption
Journal of Cryptology
2024-12-27Paper
Homomorphic encryption: a mathematical survey
International Congress of Mathematicians
2024-03-20Paper
Achievable \textsf{CCA2} relaxation for homomorphic encryption
Theory of Cryptography
2023-08-14Paper
Random-index PIR and applications
 
2023-04-13Paper
Practical non-interactive publicly verifiable secret sharing with thousands of parties
 
2022-08-30Paper
YOSO: You only speak once. Secure MPC with stateless ephemeral roles
 
2022-04-22Paper
Can a public blockchain keep a secret?
 
2021-12-01Paper
Homomorphic encryption for finite automata
 
2020-05-05Paper
Compressible FHE with applications to PIR
 
2020-04-30Paper
A unified framework for trapdoor-permutation-based sequential aggregate signatures
 
2018-05-29Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Algorithmica
2018-01-05Paper
Computing on the edge of chaos: structure and randomness in encrypted computation
 
2017-11-06Paper
Cryptanalyses of Candidate Branching Program Obfuscators
Lecture Notes in Computer Science
2017-06-23Paper
(Leveled) fully homomorphic encryption without bootstrapping
ACM Transactions on Computation Theory
2016-10-24Paper
(Leveled) fully homomorphic encryption without bootstrapping
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits
SIAM Journal on Computing
2016-07-04Paper
Functional encryption without obfuscation
Theory of Cryptography
2016-04-08Paper
Private database access with HE-over-ORAM architecture
Applied Cryptography and Network Security
2016-03-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Lecture Notes in Computer Science
2015-12-10Paper
Graph-induced multilinear maps from lattices
Theory of Cryptography
2015-07-06Paper
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Optimizing ORAM and Using It Efficiently for Secure Computation
Privacy Enhancing Technologies
2014-08-19Paper
Witness encryption and its applications
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Witness encryption from instance independent assumptions
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
(Leveled) fully homomorphic encryption without bootstrapping
ACM Transactions on Computation Theory
2014-07-01Paper
Separating succinct non-interactive arguments from all falsifiable assumptions
Proceedings of the forty-third annual ACM symposium on Theory of computing
2014-06-05Paper
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Garbled RAM revisited
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Two-round secure MPC from indistinguishability obfuscation
Theory of Cryptography
2014-02-18Paper
Private database queries using somewhat homomorphic encryption
Applied Cryptography and Network Security
2014-01-24Paper
Discrete Gaussian leftover hash lemma over infinite domains
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Attribute-based encryption for circuits from multilinear maps
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Quadratic span programs and succinct NIZKs without PCPs
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Candidate Multilinear Maps from Ideal Lattices
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Packed ciphertexts in LWE-based homomorphic encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Encrypted messages from the heights of cryptomania
Theory of Cryptography
2013-03-18Paper
Ring switching in BGV-style homomorphic encryption
Lecture Notes in Computer Science
2012-09-25Paper
Homomorphic evaluation of the AES circuit
Lecture Notes in Computer Science
2012-09-25Paper
Better bootstrapping in fully homomorphic encryption
Public Key Cryptography – PKC 2012
2012-07-20Paper
Fully homomorphic encryption with polylog overhead
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Implementing Gentry's fully-homomorphic encryption scheme
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Non-interactive verifiable computing: outsourcing computation to untrusted workers
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Toward basing fully homomorphic encryption on worst-case hardness
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Computing arbitrary functions of encrypted data
Communications of the ACM
2010-07-14Paper
Fully homomorphic encryption over the integers
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
A simple BGN-type cryptosystem from LWE
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
The geometry of provable security: some proofs of security in which lattices make a surprise appearance
The LLL Algorithm
2010-03-05Paper
Computing on Encrypted Data
Cryptology and Network Security
2009-11-26Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Hierarchical Identity Based Encryption with Polynomially Many Levels
Theory of Cryptography
2009-03-03Paper
New Multiparty Signature Schemes for Network Routing Applications
ACM Transactions on Information and System Security
2009-02-24Paper
Trapdoors for hard lattices and new cryptographic constructions
Proceedings of the fortieth annual ACM symposium on Theory of computing
2009-01-05Paper
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs
Lecture Notes in Computer Science
2008-03-18Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Practical Identity-Based Encryption Without Random Oracles
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
Lecture Notes in Computer Science
2007-09-04Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Eliminating random permutation oracles in the Even-Mansour cipher
Lecture Notes in Computer Science
2005-08-12Paper
scientific article; zbMATH DE number 2086714 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2081055 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2009971 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 2009961 (Why is no real title available?)
 
2003-11-26Paper
Hierarchical ID-Based Cryptography
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1722678 (Why is no real title available?)
 
2002-03-21Paper


Research outcomes over time


This page was built for person: Craig Gentry