On CCA-Secure Somewhat Homomorphic Encryption
From MaRDI portal
Publication:2889863
Recommendations
- On the CCA-1 security of somewhat homomorphic encryption over the integers
- Homomorphic Encryption with CCA Security
- CCA-secure keyed-fully homomorphic encryption
- On homomorphic encryption and chosen-ciphertext security
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- A generic construction of CCA-secure deterministic encryption
- Bounded CCA2-Secure Encryption
- Structure preserving CCA secure encryption and applications
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
Cites work
- scientific article; zbMATH DE number 1617928 (Why is no real title available?)
- scientific article; zbMATH DE number 176566 (Why is no real title available?)
- scientific article; zbMATH DE number 1302834 (Why is no real title available?)
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1848307 (Why is no real title available?)
- Certificateless public key cryptography
- Ciphertext verification security of symmetric encryption schemes
- Cryptography and Coding
- Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries
- Formal proofs for the security of signcryption
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption with relatively small key and ciphertext sizes
- Implementing Gentry's fully-homomorphic encryption scheme
- On lattices, learning with errors, random linear codes, and cryptography
- On lattices, learning with errors, random linear codes, and cryptography
- On the CCA1-security of Elgamal and Damgård's Elgamal
- Semi-homomorphic encryption and multiparty computation
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Cited in
(32)- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- FHE circuit privacy almost for free
- Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
- A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem
- Computing primitive idempotents in finite commutative rings and applications
- CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
- A generic construction of CCA-secure deterministic encryption
- On the CCA-1 security of somewhat homomorphic encryption over the integers
- Securing approximate homomorphic encryption using differential privacy
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- On the security of homomorphic encryption on approximate numbers
- Homomorphic authenticated encryption secure against chosen-ciphertext attack
- Limits of provable security for homomorphic encryption
- Analysis of the security of generic homomorphic authenticated encryption
- Information and Communications Security
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Practical Parameters for Somewhat Homomorphic Encryption (SHE) Schemes on Binary Circuits
- A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- On key recovery attacks against existing somewhat homomorphic encryption schemes
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- On homomorphic encryption and chosen-ciphertext security
- On the practical \(\mathrm{CPA}^D\) security of ``exact and threshold FHE schemes and libraries
- Homomorphic Encryption with CCA Security
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Keyed-fully homomorphic encryption without indistinguishability obfuscation
This page was built for publication: On CCA-Secure Somewhat Homomorphic Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889863)