메뉴 건너뛰기




Volumn 8813, Issue , 2014, Pages 1-19

Bootstrappable identity-based fully homomorphic encryption

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84911427746     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-12280-9_1     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 2
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
    • Smart, N., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 420-443
    • Smart, N.1    Vercauteren, F.2
  • 3
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • In: Gilbert, H. (ed.), Springer, Heidelberg
    • van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4
  • 4
    • 80051986706 scopus 로고    scopus 로고
    • Fully homomorphic encryption from ring-LWE and security for key dependent messages
    • In: Rogaway, P. (ed.), Springer, Heidelberg
    • Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011)
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 505-524
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 6
    • 84884485247 scopus 로고    scopus 로고
    • Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
    • In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
    • Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013)
    • (2013) CRYPTO 2013, Part I. LNCS , vol.8042 , pp. 75-92
    • Gentry, C.1    Sahai, A.2    Waters, B.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • In: Kilian, J. (ed.), Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS, , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • In: Honary, B. (ed.), Springer, Heidelberg
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001. LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 11
    • 84884492785 scopus 로고    scopus 로고
    • Homomorphic encryption with access policies: Characterization and new constructions
    • In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.), Springer, Heidelberg
    • Clear, M., Hughes, A., Tewari, H.: Homomorphic encryption with access policies: Characterization and new constructions. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 61–87. Springer, Heidelberg (2013)
    • (2013) AFRICACRYPT 2013. LNCS , vol.7918 , pp. 61-87
    • Clear, M.1    Hughes, A.2    Tewari, H.3
  • 13
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H)IBE in the standard model
    • In: Gilbert, H. (ed.), Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 14
    • 77957015647 scopus 로고    scopus 로고
    • Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98–115. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 98-115
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 15
    • 77954654490 scopus 로고    scopus 로고
    • Bonsai trees, or how to delegate a lattice basis
    • In: Gilbert, H. (ed.), Springer, Heidelberg
    • Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523–552. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 523-552
    • Cash, D.1    Hofheinz, D.2    Kiltz, E.3    Peikert, C.4
  • 16
    • 84894240173 scopus 로고    scopus 로고
    • How to use indistinguishability obfuscation: Deniable encryption, and more
    • Sahai, A., Waters, B.: How to use indistinguishability obfuscation: Deniable encryption, and more. IACR Cryptology ePrint Archive 2013, 454 (2013)
    • (2013) IACR Cryptology Eprint Archive , pp. 454
    • Sahai, A.1    Waters, B.2
  • 17
    • 84893494300 scopus 로고    scopus 로고
    • Candidate in-distinguishability obfuscation and functional encryption for all circuits
    • IEEE Computer Society
    • Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate in-distinguishability obfuscation and functional encryption for all circuits. In: FOCS, pp. 40–49. IEEE Computer Society (2013)
    • (2013) FOCS , pp. 40-49
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Raykova, M.4    Sahai, A.5    Waters, B.6
  • 18
    • 84892392741 scopus 로고    scopus 로고
    • Constrained pseudorandom functions and their applications
    • In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
    • Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280–300. Springer, Heidelberg (2013)
    • (2013) ASIACRYPT 2013, Part II. LNCS , vol.8270 , pp. 280-300
    • Boneh, D.1    Waters, B.2
  • 19
    • 84958528095 scopus 로고    scopus 로고
    • Functional signatures and pseudorandom functions
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)
    • (2014) PKC 2014. LNCS , vol.8383 , pp. 501-519
    • Boyle, E.1    Goldwasser, S.2    Ivan, I.3
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
    • (2005) EU-ROCRYPT 2005. LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 14844324877 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles. IACR Cryptology ePrint Archive 2004, 172 (2004)
    • (2004) IACR Cryptology Eprint Archive , vol.2004 , pp. 172
    • Boneh, D.1    Boyen, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.