On CCA-Secure Somewhat Homomorphic Encryption
From MaRDI portal
Publication:2889863
DOI10.1007/978-3-642-28496-0_4zbMATH Open1292.94106OpenAlexW1574687437MaRDI QIDQ2889863FDOQ2889863
Authors: Jake Loftus, Alexander May, Frederik Vercauteren, N. P. Smart
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_4
Recommendations
- On the CCA-1 security of somewhat homomorphic encryption over the integers
- Homomorphic Encryption with CCA Security
- CCA-secure keyed-fully homomorphic encryption
- On homomorphic encryption and chosen-ciphertext security
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- A generic construction of CCA-secure deterministic encryption
- Bounded CCA2-Secure Encryption
- Structure preserving CCA secure encryption and applications
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
Cites Work
- Implementing Gentry's fully-homomorphic encryption scheme
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Certificateless public key cryptography
- Title not available (Why is that?)
- Fully homomorphic encryption with relatively small key and ciphertext sizes
- On lattices, learning with errors, random linear codes, and cryptography
- Semi-homomorphic encryption and multiparty computation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Ciphertext verification security of symmetric encryption schemes
- Formal proofs for the security of signcryption
- On the CCA1-security of Elgamal and Damgård's Elgamal
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptography and Coding
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries
Cited In (32)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- FHE circuit privacy almost for free
- Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
- Computing primitive idempotents in finite commutative rings and applications
- A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem
- CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
- Securing approximate homomorphic encryption using differential privacy
- A generic construction of CCA-secure deterministic encryption
- On the CCA-1 security of somewhat homomorphic encryption over the integers
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- Homomorphic authenticated encryption secure against chosen-ciphertext attack
- On the security of homomorphic encryption on approximate numbers
- Limits of provable security for homomorphic encryption
- Analysis of the security of generic homomorphic authenticated encryption
- Information and Communications Security
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Practical Parameters for Somewhat Homomorphic Encryption (SHE) Schemes on Binary Circuits
- A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability
- On key recovery attacks against existing somewhat homomorphic encryption schemes
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- On the practical \(\mathrm{CPA}^D\) security of ``exact and threshold FHE schemes and libraries
- On homomorphic encryption and chosen-ciphertext security
- Homomorphic Encryption with CCA Security
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Keyed-fully homomorphic encryption without indistinguishability obfuscation
This page was built for publication: On CCA-Secure Somewhat Homomorphic Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889863)