Keyed-fully homomorphic encryption without indistinguishability obfuscation
From MaRDI portal
Publication:2096599
DOI10.1007/978-3-031-09234-3_1OpenAlexW4285293334MaRDI QIDQ2096599FDOQ2096599
Authors: Shingo Sato, Keita Emura, Atsushi Takayasu
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-09234-3_1
Recommendations
- CCA-secure keyed-fully homomorphic encryption
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption over the integers with shorter public keys
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Title not available (Why is that?)
- (Leveled) fully homomorphic encryption without bootstrapping
- On the Non-malleability of the Fiat-Shamir Transform
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Batch fully homomorphic encryption over the integers
- Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces
- Title not available (Why is that?)
- Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures
- On CCA-Secure Somewhat Homomorphic Encryption
- Hash proof systems over lattices revisited
- Dual-system simulation-soundness with applications to UC-PAKE and more
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Multi-identity and multi-key leveled FHE from learning with errors
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- CCA-secure keyed-fully homomorphic encryption
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Recursive composition and bootstrapping for SNARKs and proof-carrying data
- The hunting of the SNARK
- Lattice-based FHE as secure as PKE
- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- Succinct arguments in the quantum random oracle model
- Targeted homomorphic attribute-based encryption
Cited In (10)
- Title not available (Why is that?)
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- CCA-secure keyed-fully homomorphic encryption
- Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- Chosen ciphertext secure keyed two-level homomorphic encryption
- Attribute-based keyed fully homomorphic encryption
Uses Software
This page was built for publication: Keyed-fully homomorphic encryption without indistinguishability obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096599)