-
2
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Smart, N., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 420-443
-
-
Smart, N.1
Vercauteren, F.2
-
3
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
4
-
-
80051986706
-
Fully homomorphic encryption from ring-LWE and security for key dependent messages
-
In: Rogaway, P. (ed.), Springer, Heidelberg
-
Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
6
-
-
84884485247
-
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
-
In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 75-92
-
-
Gentry, C.1
Sahai, A.2
Waters, B.3
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
In: Kilian, J. (ed.), Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS,
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
In: Honary, B. (ed.), Springer, Heidelberg
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001. LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
11
-
-
84884492785
-
Homomorphic encryption with access policies: Characterization and new constructions
-
In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.), Springer, Heidelberg
-
Clear, M., Hughes, A., Tewari, H.: Homomorphic encryption with access policies: Characterization and new constructions. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 61–87. Springer, Heidelberg (2013)
-
(2013)
AFRICACRYPT 2013. LNCS
, vol.7918
, pp. 61-87
-
-
Clear, M.1
Hughes, A.2
Tewari, H.3
-
12
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
ACM, New York
-
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM, New York (2008)
-
(2008)
STOC 2008: Proceedings of the 40Th Annual ACM Symposium on Theory of Computing
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
13
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
14
-
-
77957015647
-
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98–115. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 98-115
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
15
-
-
77954654490
-
Bonsai trees, or how to delegate a lattice basis
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 523–552. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
16
-
-
84894240173
-
How to use indistinguishability obfuscation: Deniable encryption, and more
-
Sahai, A., Waters, B.: How to use indistinguishability obfuscation: Deniable encryption, and more. IACR Cryptology ePrint Archive 2013, 454 (2013)
-
(2013)
IACR Cryptology Eprint Archive
, pp. 454
-
-
Sahai, A.1
Waters, B.2
-
17
-
-
84893494300
-
Candidate in-distinguishability obfuscation and functional encryption for all circuits
-
IEEE Computer Society
-
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate in-distinguishability obfuscation and functional encryption for all circuits. In: FOCS, pp. 40–49. IEEE Computer Society (2013)
-
(2013)
FOCS
, pp. 40-49
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Raykova, M.4
Sahai, A.5
Waters, B.6
-
18
-
-
84892392741
-
Constrained pseudorandom functions and their applications
-
In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
-
Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280–300. Springer, Heidelberg (2013)
-
(2013)
ASIACRYPT 2013, Part II. LNCS
, vol.8270
, pp. 280-300
-
-
Boneh, D.1
Waters, B.2
-
19
-
-
84958528095
-
Functional signatures and pseudorandom functions
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)
-
(2014)
PKC 2014. LNCS
, vol.8383
, pp. 501-519
-
-
Boyle, E.1
Goldwasser, S.2
Ivan, I.3
-
20
-
-
84889072826
-
Delegatable pseudorandom functions and applications
-
Kiayias, A., Papadopoulos, S., Triandopoulos, N., Zacharias, T.: Delegatable pseudorandom functions and applications. In: ACM Conference on Computer and Communications Security, pp. 669–684. ACM (2013)
-
(2013)
ACM Conference on Computer and Communications Security
, pp. 669-684
-
-
Kiayias, A.1
Papadopoulos, S.2
Triandopoulos, N.3
Zacharias, T.4
-
21
-
-
24944554962
-
Fuzzy identity-based encryption
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
-
(2005)
EU-ROCRYPT 2005. LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
22
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society, Washington, DC
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE Computer Society, Washington, DC (2007)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
84862629748
-
On-the-fly multiparty computation on the cloud via multikey fully hóomorphic encryption
-
ACM Press, New York
-
López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully hóomorphic encryption. In: Proceedings of the 44th Symposium on Theory of Computing, STOC 2012, pp. 1219–1234. ACM Press, New York (2012)
-
(2012)
Proceedings of the 44Th Symposium on Theory of Computing, STOC 2012
, pp. 1219-1234
-
-
López-Alt, A.1
Tromer, E.2
Vaikuntanathan, V.3
-
24
-
-
84901681842
-
Multi-input functional encryption
-
Goldwasser, S., Goyal, V., Jain, A., Sahai, A.: Multi-input functional encryption. Cryptology ePrint Archive, Report 2013/727 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology Eprint Archive, Report 2013/727
-
-
Goldwasser, S.1
Goyal, V.2
Jain, A.3
Sahai, A.4
-
25
-
-
14844324877
-
Efficient selective-id secure identity based encryption without random oracles
-
Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles. IACR Cryptology ePrint Archive 2004, 172 (2004)
-
(2004)
IACR Cryptology Eprint Archive
, vol.2004
, pp. 172
-
-
Boneh, D.1
Boyen, X.2
|