-
2
-
-
60349098175
-
New techniques for private stream searching
-
J. Bethencourt, D. Song, and B. Water, "New Techniques forPrivate Stream Searching," ACM Trans. Information and SystemSecurity, vol. 12, no. 3, pp. 1-32, 2009.
-
(2009)
ACM Trans. Information and SystemSecurity
, vol.12
, Issue.3
, pp. 1-32
-
-
Bethencourt, J.1
Song, D.2
Water, B.3
-
3
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertext
-
D. Boneh, E. Goh, and K. Nissim, "Evaluating 2-DNF Formulas onCiphertext," Proc. Second Int'l Conf. Theory of Cryptography, pp. 325-341, 2005.
-
(2005)
Proc. Second Int'l Conf. Theory of Cryptography
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
6
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
I. Damgard and M. Jurik, "A Generalisation, a Simplification andSome Applications of Paillier's Probabilistic Public-Key System,"Proc. Fourth Int'l Workshop Practice and Theory in Public KeyCryptography (PKC '01), pp. 119-136, 2001. (Pubitemid 33232937)
-
(2001)
Lecture notes in computer science
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
7
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "FullyHomomorphic Encryption over the Integers," Proc. Advances inCryptology (EUROCRYPT '10), pp. 24-43, 2010.
-
Proc. Advances InCryptology (EUROCRYPT '10)
, vol.2010
, pp. 24-43
-
-
Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
8
-
-
84874800178
-
A public-key cryptosystem and a signature schemebased on discrete logarithms
-
July
-
T. ElGamal, "A Public-Key Cryptosystem and a Signature SchemeBased on Discrete Logarithms," IEEE Trans. Information Theory,vol. 31, no. 4, pp. 469-472, July 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
11
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry, "Computing Arbitrary Functions of Encrypted Data,"Comm. ACM, vol. 53, no. 3, pp. 97-105, 2010.
-
(2010)
Comm. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
12
-
-
77957009075
-
Toward basing fully homomorphic encryption on worst-case hardness
-
C. Gentry, "Toward Basing Fully Homomorphic Encryption onWorst-Case Hardness," Proc. Advances in Cryptology (CRYPTO '10),pp. 116-137, 2010.
-
(2010)
Proc. Advances in Cryptology (CRYPTO '10)
, pp. 116-137
-
-
Gentry, C.1
-
18
-
-
36749033301
-
Private searching on streamingdata
-
R. Ostrovsky and W. Skeith, "Private Searching on StreamingData," J. Cryptology, vol. 20, no. 4, pp. 397-430, 2007.
-
(2007)
J. Cryptology
, vol.20
, Issue.4
, pp. 397-430
-
-
Ostrovsky, R.1
Skeith, W.2
-
25
-
-
84873654295
-
Private (t, n) threshold searching onstreaming data
-
X. Yi and C.P. Xing, "Private (t, n) Threshold Searching onStreaming Data," Proc. Int'l Conf. Social Computing Privacy,Security, Risk and Trust (PASSAT '12), pp. 676-683, 2012.
-
(2012)
Proc. Int'l Conf. Social Computing Privacy,Security, Risk and Trust (PASSAT '12)
, pp. 676-683
-
-
Yi, X.1
Xing, C.P.2
|