| Publication | Date of Publication | Type |
|---|
Achievable \textsf{CCA2} relaxation for homomorphic encryption Journal of Cryptology | 2024-12-27 | Paper |
Homomorphic encryption: a mathematical survey International Congress of Mathematicians | 2024-03-20 | Paper |
Achievable \textsf{CCA2} relaxation for homomorphic encryption Theory of Cryptography | 2023-08-14 | Paper |
Random-index PIR and applications | 2023-04-13 | Paper |
Practical non-interactive publicly verifiable secret sharing with thousands of parties | 2022-08-30 | Paper |
YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
Can a public blockchain keep a secret? | 2021-12-01 | Paper |
Homomorphic encryption for finite automata | 2020-05-05 | Paper |
Compressible FHE with applications to PIR | 2020-04-30 | Paper |
A unified framework for trapdoor-permutation-based sequential aggregate signatures | 2018-05-29 | Paper |
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input Algorithmica | 2018-01-05 | Paper |
Computing on the edge of chaos: structure and randomness in encrypted computation | 2017-11-06 | Paper |
Cryptanalyses of Candidate Branching Program Obfuscators Lecture Notes in Computer Science | 2017-06-23 | Paper |
(Leveled) fully homomorphic encryption without bootstrapping ACM Transactions on Computation Theory | 2016-10-24 | Paper |
(Leveled) fully homomorphic encryption without bootstrapping Proceedings of the 3rd Innovations in Theoretical Computer Science Conference | 2016-10-07 | Paper |
Candidate indistinguishability obfuscation and functional encryption for all circuits SIAM Journal on Computing | 2016-07-04 | Paper |
Functional encryption without obfuscation Theory of Cryptography | 2016-04-08 | Paper |
Private database access with HE-over-ORAM architecture Applied Cryptography and Network Security | 2016-03-10 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations Lecture Notes in Computer Science | 2015-12-10 | Paper |
Graph-induced multilinear maps from lattices Theory of Cryptography | 2015-07-06 | Paper |
Fully homomorphic encryption using ideal lattices Proceedings of the forty-first annual ACM symposium on Theory of computing | 2015-02-04 | Paper |
Optimizing ORAM and Using It Efficiently for Secure Computation Privacy Enhancing Technologies | 2014-08-19 | Paper |
Witness encryption and its applications Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2014-08-07 | Paper |
Witness encryption from instance independent assumptions Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science | 2014-07-30 | Paper |
(Leveled) fully homomorphic encryption without bootstrapping ACM Transactions on Computation Theory | 2014-07-01 | Paper |
Separating succinct non-interactive arguments from all falsifiable assumptions Proceedings of the forty-third annual ACM symposium on Theory of computing | 2014-06-05 | Paper |
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Garbled RAM revisited Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Two-round secure MPC from indistinguishability obfuscation Theory of Cryptography | 2014-02-18 | Paper |
Private database queries using somewhat homomorphic encryption Applied Cryptography and Network Security | 2014-01-24 | Paper |
Discrete Gaussian leftover hash lemma over infinite domains Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Attribute-based encryption for circuits from multilinear maps Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Quadratic span programs and succinct NIZKs without PCPs Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Candidate Multilinear Maps from Ideal Lattices Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Packed ciphertexts in LWE-based homomorphic encryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Encrypted messages from the heights of cryptomania Theory of Cryptography | 2013-03-18 | Paper |
Ring switching in BGV-style homomorphic encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Homomorphic evaluation of the AES circuit Lecture Notes in Computer Science | 2012-09-25 | Paper |
Better bootstrapping in fully homomorphic encryption Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Fully homomorphic encryption with polylog overhead Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Implementing Gentry's fully-homomorphic encryption scheme Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Non-interactive verifiable computing: outsourcing computation to untrusted workers Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Toward basing fully homomorphic encryption on worst-case hardness Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Computing arbitrary functions of encrypted data Communications of the ACM | 2010-07-14 | Paper |
Fully homomorphic encryption over the integers Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
A simple BGN-type cryptosystem from LWE Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
The geometry of provable security: some proofs of security in which lattices make a surprise appearance The LLL Algorithm | 2010-03-05 | Paper |
Computing on Encrypted Data Cryptology and Network Security | 2009-11-26 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Hierarchical Identity Based Encryption with Polynomially Many Levels Theory of Cryptography | 2009-03-03 | Paper |
New Multiparty Signature Schemes for Network Routing Applications ACM Transactions on Information and System Security | 2009-02-24 | Paper |
Trapdoors for hard lattices and new cryptographic constructions Proceedings of the fortieth annual ACM symposium on Theory of computing | 2009-01-05 | Paper |
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs Lecture Notes in Computer Science | 2008-03-18 | Paper |
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Practical Identity-Based Encryption Without Random Oracles Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
A Method for Making Password-Based Key Exchange Resilient to Server Compromise Lecture Notes in Computer Science | 2007-09-04 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Eliminating random permutation oracles in the Even-Mansour cipher Lecture Notes in Computer Science | 2005-08-12 | Paper |
scientific article; zbMATH DE number 2086714 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2081055 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2009971 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 2009961 (Why is no real title available?) | 2003-11-26 | Paper |
Hierarchical ID-Based Cryptography Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1722678 (Why is no real title available?) | 2002-03-21 | Paper |