Homomorphic encryption

Results: 238



#Item
201Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
202Secure multi-party computation / Communications protocol / Oblivious transfer / Homomorphic encryption / Transmission Control Protocol / Public-key cryptography / Hamming / Port / Cryptography / Cryptographic protocols / Secure two-party computation

Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2009-04-09 09:23:00
203Cryptographic protocols / Computational complexity theory / IP / Homomorphic encryption / Paillier cryptosystem / Communication complexity / One-way function / Polynomial / Oblivious transfer / Cryptography / Theoretical computer science / Applied mathematics

Efficient Private Matching and Set Intersection Michael J. Freedman1? , Kobbi Nissim2?? , and Benny Pinkas3 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:04
204Paillier cryptosystem / Deterministic encryption / PostgreSQL / Query optimizer / Column / Select / Bitmap index / Query plan / Initialization vector / Cryptography / Data management / Homomorphic encryption

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: db.csail.mit.edu

Language: English - Date: 2013-03-28 09:28:30
205Homomorphic encryption / XTR / One-time pad / Key encapsulation / Cryptography / Ciphertext indistinguishability / Learning with errors

Lattice Cryptography for the Internet Chris Peikert∗ February 17, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-18 17:10:47
206Malleability / Cryptography / Symbol / Homomorphic encryption

Published in P. Q. Nguyen and E. Oswald, Eds, Advances in Cryptology − EUROCRYPT 2014, vol[removed]of Lecture Notes in Computer Science, pp[removed], Springer, 2014. Non-Malleability from Malleability: Simulation-Sound Q

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-11 12:15:40
207Key management / Cryptography / Cryptographic software / Special purpose file systems / Computer security / Cloud infrastructure / Vormetric / Transparent Data Encryption / Disk encryption / Computing / Cloud computing

Porticor Virtual Private Data Safeguarding Data in the Cloud Porticor® Virtual Private Data™ (VPD™) combines state of the art data encryption with patented homomorphic split-key management to offer the most secure,

Add to Reading List

Source URL: www.porticor.com

Language: English - Date: 2013-07-04 08:48:08
208Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
209Finite fields / Cryptographic protocols / Homomorphic encryption / Diffie–Hellman problem / Strong RSA assumption / RSA / Elliptic curve cryptography / Actor model / Eurocrypt / Cryptography / Public-key cryptography / Computational hardness assumptions

Victor Shoup Curriculum Vitae Feb. 6, 2014 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2014-02-06 21:21:47
210ElGamal encryption / RSA / Homomorphic encryption / Ordinal number / Applied mathematics / Public-key cryptography / Mathematics / Paillier cryptosystem

Solving the Discrete Logarithm Problem for Packing Candidate Preferences James Heather1 , Chris Culnane1 , Steve Schneider1 , Sriramkrishnan Srinivasan and Zhe Xia2 * 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
UPDATE