Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Fully Homomorphic Encryption over the Integers - MaRDI portal

Fully Homomorphic Encryption over the Integers

From MaRDI portal
Publication:3563828

DOI10.1007/978-3-642-13190-5_2zbMath1279.94130OpenAlexW2156030242WikidataQ28002636 ScholiaQ28002636MaRDI QIDQ3563828

Shai Halevi, Vinod Vaikuntanathan, Marten van Dijk, Craig Gentry

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_2




Related Items (only showing first 100 items - show all)

New Ideas to Build Noise-Free Homomorphic CryptosystemsA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesVerifiable Range Query Processing for Cloud ComputingAn Improved Leveled Fully Homomorphic Encryption Scheme over the IntegersHDDA: DataSifter: statistical obfuscation of electronic health records and other sensitive datasetsEfficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesMulti-key Homomorphic Proxy Re-EncryptionVerifiable Decryption for Fully Homomorphic EncryptionHomomorphic encryption: a mathematical surveyEvalRound algorithm in CKKS bootstrappingFINAL: faster FHE instantiated with NTRU and LWEFast practical lattice reduction through iterated compressionComputing primitive idempotents in finite commutative rings and applications$$\mathsf {HIKE}$$ : Walking the Privacy TrailFully homomorphic encryption scheme and Fermat’s little theoremFast blind rotation for bootstrapping FHEsToward practical privacy-preserving linear regressionFoundations of Homomorphic Secret SharingCircuit-Private Multi-key FHEFHE over the Integers: Decomposed and Batched in the Post-Quantum RegimeSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsUnnamed ItemEncoding of Rational Numbers and Their Homomorphic Computations for FHE-Based ApplicationsTowards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group TheorySimultaneous diagonalization of incomplete matrices and applicationsThe Complexity of Public-Key CryptographyHomomorphic EncryptionToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsOn the deductive security of queries to confidential databases in cloud computing systemsOn CCA-Secure Somewhat Homomorphic EncryptionTowards faster polynomial-time lattice reductionPolly cracker, revisitedFully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problemFully Homomorphic Encryption with Auxiliary InputsQuantum Homomorphic Encryption for Circuits of Low T-gate ComplexityNew Multilinear Maps Over the IntegersCryptanalysis of the Co-ACD AssumptionConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsPractical private-key fully homomorphic encryption in ringsHomomorphic lower digits removal and improved FHE bootstrappingBootstrapping for approximate homomorphic encryptionSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionAn efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloudSome homomorphic cryptosystems based on nonassociative structuresPGAS: privacy-preserving graph encryption for accurate constrained shortest distance queriesIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Bootstrapping for helibSecure cloud computing based on threshold homomorphic encryptionPrivacy-preserving distributed deep learning based on secret sharingLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesCompressible FHE with applications to PIRRevisiting approximate polynomial common divisor problem and noisy multipolynomial reconstructionCryptographic algorithms for privacy-preserving online applicationsPartial Key Exposure Attack on CRT-RSAOn the smoothing parameter and last minimum of random orthogonal latticesOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemDepth Optimized Efficient Homomorphic SortingPrivate Computation on Encrypted Genomic DataOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesSecret computation of purchase history data using somewhat homomorphic encryptionFlattening NTRU for evaluation key free homomorphic encryptionCryptanalysis of the CLT13 multilinear mapApproximate GCD of several univariate polynomials with small degree perturbationsMultikey Fully Homomorphic Encryption and ApplicationsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsA multi-valued quantum fully homomorphic encryption schemeGroup homomorphic encryption: characterizations, impossibility results, and applicationsDiscrete logarithm based additively homomorphic encryption and secure data aggregationAn efficient quantum somewhat homomorphic symmetric searchable encryptionAlgorithms for the approximate common divisor problemMaliciously circuit-private multi-key FHE and MPC based on LWEFully homomorphic SIMD operationsCryptanalysis of a Homomorphic Encryption Scheme Over IntegersPrivacy preserving distributed optimization using homomorphic encryptionEPiC: efficient privacy-preserving counting for MapReduceA full RNS variant of approximate homomorphic encryptionUnsupervised Machine Learning on encrypted dataQuantum homomorphic encryption scheme with flexible number of evaluator based on \((k, n)\)-threshold quantum state sharingEfficient AGCD-based homomorphic encryption for matrix and vector arithmeticLLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE schemeVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESQuantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuitSecure Outsourced ComputationUsing the Inhomogeneous Simultaneous Approximation Problem for Cryptographic DesignBenaloh’s Dense Probabilistic Encryption RevisitedEfficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based serviceCryptanalysis of a homomorphic encryption schemeTrusted computing with addition machines. ICRT-based fully homomorphic encryption over the integersThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWESome security bounds for the key sizes of DGHV scheme(Leveled) Fully Homomorphic Encryption without BootstrappingAlgorithms for CRT-variant of approximate greatest common divisor problemCCA-Secure Keyed-Fully Homomorphic EncryptionA new reversible date-hiding algorithm for encrypted images




This page was built for publication: Fully Homomorphic Encryption over the Integers