Homomorphic encryption

Results: 238



#Item
81Nara Prefecture / Oberthur Technologies / Ikaruga /  Nara / Honshu / Geography of Japan / Cryptography / Homomorphic encryption / Nara /  Nara

Nara, Japan, February 26 - March 1, 2013 Conference Venue/Reception/Lunch/Banquet Nara Sightseeing MAP provided by Nara City Sightseeing Information Center (http://narashikanko.jp/en/) KintetsuNara

Add to Reading List

Source URL: ohta-lab.jp

Language: English - Date: 2013-03-06 06:12:32
82Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
83RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
84Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-09-01 09:06:37
85Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2010-11-25 08:58:28
86

Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-04 14:26:37
    87Mathematics / Elliptic curves / Linear algebra / Module theory / Pairing / Weil pairing / Elliptic curve / Elliptic curve cryptography / Abstract algebra / Algebra / Cryptography

    Homomorphic Encryption and Signatures from Vector Decomposition

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2011-06-28 08:08:10
    88Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

    A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

    Add to Reading List

    Source URL: www.spice-center.org

    Language: English - Date: 2012-12-19 05:32:22
    89Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

    Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    90Homomorphic encryption / Paillier cryptosystem / Deterministic encryption / HTTP Secure / ElGamal encryption / Encryption software / RSA / Cryptography / Public-key cryptography / Cryptographic software

    AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

    Add to Reading List

    Source URL: compsec.comp.nus.edu.sg

    Language: English - Date: 2014-02-03 05:14:50
    UPDATE