Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits

From MaRDI portal
Publication:5495010

DOI10.1109/FOCS.2011.94zbMath1292.94066OpenAlexW2129580084WikidataQ28002612 ScholiaQ28002612MaRDI QIDQ5495010

Craig Gentry, Shai Halevi

Publication date: 30 July 2014

Published in: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/focs.2011.94




Related Items

Polly cracker, revisitedTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelBlending FHE-NTRU Keys – The Excalibur PropertyLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesCryptographic algorithms for privacy-preserving online applicationsOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesAugmented Learning with Errors: The Untapped Potential of the Error TermFake information mechanism based privacy-preserving average consensusComputing primitive idempotents in finite commutative rings and applicationsMultikey Fully Homomorphic Encryption and ApplicationsDirect computation of branching programs and its applications to more efficient lattice-based cryptographyHomomorphic secret sharing for low degree polynomialsRing Packing and Amortized FHEW BootstrappingVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESEfficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based serviceCryptanalysis of a homomorphic encryption schemeCRT-based fully homomorphic encryption over the integersVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols(Leveled) Fully Homomorphic Encryption without BootstrappingTowards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group TheoryKey-dependent message security: generic amplification and completenessThe Geometry of Lattice CryptographyAccumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computationHomomorphic Encryption