Homomorphic encryption

Results: 238



#Item
51Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-02 12:48:47
52

HORNS: A Homomorphic Encryption Scheme for Cloud Computing using Residue Number System Mahadevan Gomathisankaran Akhilesh Tyagi

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-08 08:10:08
    53

    Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures

    Add to Reading List

    Source URL: ec14.compute.dtu.dk

    Language: English - Date: 2014-05-16 06:53:01
      54

      Accepted Papers LatinCrypt 2014     On  Key  Recovery  Attacks  against  Existing  Somewhat  Homomorphic  Encryption  Schemes  Massimo Chenal, Qiang Tang 

      Add to Reading List

      Source URL: latincrypt2014.labsec.ufsc.br

      Language: English - Date: 2014-08-27 15:24:45
        55

        Accelerating Fully Homomorphic Encryption on GPUs Wei Wang,Yin Hu,Lianmu Chen,Xinming Huang and Berk Sunar Department of Electrial and Computer Engineering Worcester Polytechnic Institute, Worcester, MA, USA weiwang@ece.

        Add to Reading List

        Source URL: ecewp.ece.wpi.edu

        Language: English - Date: 2012-11-29 11:41:35
          56Cryptography / Public-key cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Encryption / Malleability / Mental poker

          Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2015-01-11 00:33:27
          57

          Universally Composable Symbolic Analysis - for Two-Party Protocols based on Homomorphic Encryption Morten Dahl and Ivan Damgård Aarhus University

          Add to Reading List

          Source URL: ec14.compute.dtu.dk

          Language: English - Date: 2014-05-16 07:05:24
            58

            Practical Applications of Homomorphic Encryption Michael Brenner, Henning Perl and Matthew Smith Distributed Computing Security Group, Leibniz Universitt Hannover, Hannover, Germany {brenner, perl, smith}@dcsec.uni-hanno

            Add to Reading List

            Source URL: www.dcsec.uni-hannover.de

            Language: English - Date: 2012-07-30 13:48:14
              59

              When Homomorphism Becomes a Liability Zvika Brakerski∗ Abstract We show that an encryption scheme cannot have a simple decryption function and be homomorphic at the same time, even with added noise. Specifically, if a

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-09-01 18:54:16
                UPDATE