Homomorphic encryption

Results: 238



#Item
161Ciphertext / RSA / Learning with errors / Probabilistic encryption / Four-square cipher / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Predicate Encryption for Circuits from LWE Sergey Gorbunov∗ MIT Vinod Vaikuntanathan† MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 11:54:01
162Lattice points / Linear algebra / Computational number theory / Homomorphic encryption / Orthogonality / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice / Private information retrieval / Paillier cryptosystem / Cryptography / Algebra / Mathematics

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 03:49:32
163Internet Relay Chat / Computing / Internet / Cryptography / Homomorphic encryption / Transmission Control Protocol

Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) Srinivas Devadas† , Marten van Dijk‡ , Christopher W. Fletcher† , Ling Ren† † Massachusetts Institute of Technology − {d

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-18 19:08:57
164Cryptography / Politics / Cryptographic protocols / Elections / Cryptographic software / ProVerif / Homomorphic encryption / ThreeBallot / Electronic voting / Electoral systems / Information / Data

Type-Based Verification of Electronic Voting Protocols Véronique Cortier1 , Fabienne Eigner2 , Steve Kremer1 , Matteo Maffei2 , and Cyrille Wiedling3 1 LORIA, CNRS & INRIA & University of Lorraine, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 13:48:11
165Cyberwarfare / Electronic commerce / Security / Applied mathematics / Paillier cryptosystem / ElGamal encryption / Semantic security / Malleability / RSA / Cryptography / Public-key cryptography / Homomorphic encryption

Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan University of Toronto Abstract— A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypte

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2011-09-08 00:17:47
166Cyberwarfare / Applied mathematics / Finite fields / Homomorphic encryption / RSA / XTR / Learning with errors / Digital signature / Group signature / Cryptography / Public-key cryptography / Mathematics

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 09:24:22
167Computing / Secure communication / Encryption / Ciphertext / IPsec / Homomorphic encryption / Middlebox / Cipher / Cryptography / Espionage / Cyberwarfare

Big Aggregation and Intermediaries: threat or menace? Jan Seedorf, Eliot Lear, Joe Hildebrand, Barbara Fraser (Moderated by Barry Leiba)

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

Language: English - Date: 2014-03-01 03:17:08
168Science / Mathematical sciences / Knowledge / Cryptography / Homomorphic encryption / Encryption

Lecture[removed]UT Dallas Computer Science

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-06 15:02:26
169Robogals / Public-key cryptography / Academia / Higher education / Science / Cryptography / Homomorphic encryption / University of Bristol

The UniversiTy of BrisTol Magazine // WinTer[removed]how pure maths keeps us secure taking stock of egyptian coffins quantum physics you can dance to

Add to Reading List

Source URL: www.bristol.ac.uk

Language: English - Date: 2014-01-09 11:41:18
170Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
UPDATE