Keyed-fully homomorphic encryption without indistinguishability obfuscation
From MaRDI portal
Publication:2096599
Recommendations
- CCA-secure keyed-fully homomorphic encryption
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
Cites work
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- Batch fully homomorphic encryption over the integers
- CCA-secure keyed-fully homomorphic encryption
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Dual-system simulation-soundness with applications to UC-PAKE and more
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption over the integers with shorter public keys
- Fully homomorphic encryption using ideal lattices
- Hash proof systems over lattices revisited
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Lattice-based FHE as secure as PKE
- Multi-identity and multi-key leveled FHE from learning with errors
- Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures
- On CCA-Secure Somewhat Homomorphic Encryption
- On the Non-malleability of the Fiat-Shamir Transform
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Recursive composition and bootstrapping for SNARKs and proof-carrying data
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- Succinct arguments in the quantum random oracle model
- Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces
- Targeted homomorphic attribute-based encryption
- The hunting of the SNARK
Cited in
(10)- scientific article; zbMATH DE number 6874618 (Why is no real title available?)
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- CCA-secure keyed-fully homomorphic encryption
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- Chosen ciphertext secure keyed two-level homomorphic encryption
- Attribute-based keyed fully homomorphic encryption
This page was built for publication: Keyed-fully homomorphic encryption without indistinguishability obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096599)