Cryptanalysis of a homomorphic encryption scheme
From MaRDI portal
Publication:680918
DOI10.1007/S12095-017-0243-8zbMATH Open1384.94036OpenAlexW2518917232WikidataQ121322988 ScholiaQ121322988MaRDI QIDQ680918FDOQ680918
Authors: Sonia Bogos, John Gaspoz, Serge Vaudenay
Publication date: 29 January 2018
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://infoscience.epfl.ch/record/220692/files/main.pdf
Recommendations
- Cryptanalysis of chosen symmetric homomorphic schemes
- Cryptanalysis of a homomorphic encryption scheme over integers
- Comparison-based attacks against noise-free fully homomorphic encryption schemes
- On the CCA-1 security of somewhat homomorphic encryption over the integers
- CRT-based fully homomorphic encryption over the integers
Cites Work
- Fully homomorphic encryption with polylog overhead
- Implementing Gentry's fully-homomorphic encryption scheme
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption over the integers with shorter public keys
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
- Title not available (Why is that?)
- (Leveled) fully homomorphic encryption without bootstrapping
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
- Fully homomorphic encryption with relatively small key and ciphertext sizes
- A Framework for Efficient and Composable Oblivious Transfer
- Fully homomorphic SIMD operations
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- Title not available (Why is that?)
- Packed ciphertexts in LWE-based homomorphic encryption
Cited In (13)
- Cryptanalysis of the Convex Hull Click Human Identification Protocol
- Security Analysis of the Strong Diffie-Hellman Problem
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- Ontology-based semantic annotation for problem set archives in the Web
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Security analysis of modified Rivest scheme
- Cryptanalysis of a homomorphic encryption scheme over integers
- Cryptanalysis of an Extension of the Hill Cipher
- Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017
- Cryptanalysis on an access control in a hierarchy
- Counter-Cryptanalysis
- Title not available (Why is that?)
Uses Software
This page was built for publication: Cryptanalysis of a homomorphic encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q680918)