<--- Back to Details
First PageDocument Content
Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce
Date: 2015-04-14 07:10:50
Secure multi-party computation
Standard model
Homomorphic encryption
Pseudorandom generator
Cryptographic primitive
Commitment scheme
Information-theoretic security
Goldwasser–Micali cryptosystem
Secret sharing
Cryptography
Cryptographic protocols
Electronic commerce

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 933,16 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

DocID: 1xTjK - View Document

Toward Automated Analysis and Prototyping of Homomorphic Encryption Schemes Cyrielle FERON Loïc LAGADEC Vianney LAPOTRE

DocID: 1vm3I - View Document

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1

DocID: 1vjjZ - View Document

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

DocID: 1vf4f - View Document

A Full RNS Implementation of Fan and Vercauteren Somewhat Homomorphic Encryption Scheme Presented by: Vincent Zucca1 Joint work with: Jean-Claude Bajard1 , Julien Eynard2 and Anwar Hasan2 1 Sorbonne

DocID: 1vaCY - View Document