Keyed-fully homomorphic encryption without indistinguishability obfuscation
From MaRDI portal
Publication:2096599
DOI10.1007/978-3-031-09234-3_1OpenAlexW4285293334MaRDI QIDQ2096599
Atsushi Takayasu, Keita Emura, Shingo Sato
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-09234-3_1
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- The hunting of the SNARK
- Hash proof systems over lattices revisited
- Succinct arguments in the quantum random oracle model
- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- CCA-Secure Keyed-Fully Homomorphic Encryption
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- (Leveled) fully homomorphic encryption without bootstrapping
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces
- On the Non-malleability of the Fiat-Shamir Transform
- On CCA-Secure Somewhat Homomorphic Encryption
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Lattice-based FHE as secure as PKE
- Targeted Homomorphic Attribute-Based Encryption
- Multi-identity and Multi-key Leveled FHE from Learning with Errors
- Fully Homomorphic Encryption over the Integers
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
- Batch Fully Homomorphic Encryption over the Integers
- Fully homomorphic encryption using ideal lattices
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys
- Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Recursive composition and bootstrapping for SNARKS and proof-carrying data
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
This page was built for publication: Keyed-fully homomorphic encryption without indistinguishability obfuscation