Homomorphic encryption

Results: 238



#Item
191Turing machine / Cryptography / Models of computation / Homomorphic encryption / Computability / Alan Turing / Advice / PP / NP / Theoretical computer science / Applied mathematics / Computational complexity theory

Overcoming the Worst-Case Curse for Cryptographic Constructions Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
192Security / Cyberwarfare / Cipher / Applied mathematics / RSA / Verifiable computing / Probabilistic encryption / Cryptography / Public-key cryptography / Homomorphic encryption

Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond Shafi Goldwasser? Yael Kalai† Raluca Ada Popa? Vinod Vaikuntanathan./

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
193Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
194PostgreSQL / Deterministic encryption / Query optimizer / Ciphertext / RSA / Bitmap index / Advanced Encryption Standard / Cipher / Initialization vector / Cryptography / Homomorphic encryption / Paillier cryptosystem

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
195RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
196Computational complexity theory / Computability theory / Complexity classes / Universal Turing machine / Homomorphic encryption / Computability / Alan Turing / Advice / Algorithm / Theoretical computer science / Applied mathematics / Turing machine

How to Run Turing Machines on Encrypted Data Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ ◃▹ Vinod Vaikuntanathan

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
197Initialization vector / Probabilistic encryption / Ciphertext indistinguishability / Deterministic encryption / RSA / Disk encryption theory / Block cipher / Cipher / MapReduce / Cryptography / Homomorphic encryption / Paillier cryptosystem

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
198Homomorphic encryption / Database schema / Public-key cryptography / Random oracle / ID-based encryption / Cryptography / Ciphertext indistinguishability / Obfuscation

Towards a Unified Theory of Cryptographic Agents Shashank Agrawal ∗ Shweta Agrawal

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-23 06:42:41
199Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
200Malleability / Cryptography / Symbol / Homomorphic encryption

Published in P. Q. Nguyen and E. Oswald, Eds, Advances in Cryptology − EUROCRYPT 2014, vol[removed]of Lecture Notes in Computer Science, pp[removed], Springer, 2014. Non-Malleability from Malleability: Simulation-Sound Q

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-11 12:15:40
UPDATE