Homomorphic encryption

Results: 238



#Item
111Fourier analysis / Unitary operators / Proof of knowledge / Zero-knowledge proof / NP / IP / Non-interactive zero-knowledge proof / Homomorphic encryption / Discrete Fourier transform / Cryptography / Cryptographic protocols / Mathematical analysis

Verifiable Rotation of Homomorphic Encryptions ˇ Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skori´ c, and Jos´e Villegas Dept. of Mathematics and Computer Science, TU Eindhoven P.O. Box 513, 5600 MB Eindhoven, The

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2009-04-16 16:25:39
112Electoral systems / Public-key cryptography / Election fraud / Electronic voting / Threshold cryptosystem / Voting system / Communications protocol / Homomorphic encryption / Electoral fraud / Cryptography / Cryptographic protocols / Information

942 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:48
113Homomorphic encryption / ElGamal encryption / Probabilistic encryption / Blind signature / Encryption / Ciphertext / Goldwasser–Micali cryptosystem / Cipher / Zero-knowledge proof / Cryptography / Public-key cryptography / Paillier cryptosystem

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
114Secure multi-party computation / Homomorphic encryption / Paillier cryptosystem / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-03 06:46:06
115Information / Cryptography / Secure multi-party computation / Key management / Communications protocol / Lookup table / Homomorphic encryption / Secret sharing / Transmission Control Protocol / Cryptographic protocols / Data / Computing

Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1 Cybernetica AS

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 10:34:14
116Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-04 07:57:36
117Homomorphic encryption / RSA / Mathematics / Lattice / Cyberwarfare / Applied mathematics / Ideal lattice cryptography / Cryptography / Electronic commerce / Public-key cryptography

Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque1 , Moon Sung Lee2 , Tancr`ede Lepoint3 , and Mehdi Tibouchi4 1 Universit´e de Rennes 1 and Institut Universitaire de France, 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-12 19:26:06
118Public-key cryptography / IP / One-way function / Communications protocol / Fuse / Cryptography / Homomorphic encryption / Zero-knowledge proof

On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-23 15:21:41
119Ciphertext indistinguishability / Ciphertext / Security / Semantic security / RSA / Applied mathematics / Cryptography / Homomorphic encryption / Cyberwarfare

Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE∗ Michael Clear† and Ciar´an McGoldrick School of Computer Science and Statistics, Trinity College Dublin {clearm, Ciaran.McGoldri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-29 11:13:19
120Cyberwarfare / Homomorphic encryption / Electronic commerce / Applied mathematics / Security / RSA / ANts P2P / Public-key cryptography / Cryptography / Paillier cryptosystem

Sorting and Searching Behind the Curtain Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data* Foteini Baldimtsi1 and Olga Ohrimenko2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-27 11:25:46
UPDATE