Homomorphic encryption: from private-key to public-key
From MaRDI portal
Publication:3000541
Recommendations
Cited in
(16)- Limits on the power of indistinguishability obfuscation and functional encryption
- Minicrypt primitives with algebraic structure and applications
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Polly cracker, revisited
- Combinatorially homomorphic encryption
- Homomorphic encryption
- Succinct non-interactive arguments via linear interactive proofs
- Limits of provable security for homomorphic encryption
- SoK: learning with errors, circular security, and fully homomorphic encryption
- TFHE public-key encryption revisited
- \(i\)-hop homomorphic encryption and rerandomizable Yao circuits
- New ideas to build noise-free homomorphic cryptosystems
- Packed ciphertexts in LWE-based homomorphic encryption
- Public-key encryption from homogeneous CLWE
- Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity
- Homomorphic encryption: a mathematical survey
This page was built for publication: Homomorphic encryption: from private-key to public-key
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000541)