$$\mathsf {HIKE}$$ : Walking the Privacy Trail
From MaRDI portal
Publication:6162313
DOI10.1007/978-3-030-00434-7_3zbMath1515.68127OpenAlexW2889124323MaRDI QIDQ6162313
Elena Pagnin, Pablo Picazo-Sanchez, Carlo Brunetta
Publication date: 28 June 2023
Published in: Cryptology and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-00434-7_3
Cites Work
- Kangaroos, monopoly and discrete logarithms
- Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data
- Fully Homomorphic Message Authenticators
- Multi-key Homomorphic Authenticators
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
- Fully Homomorphic Encryption over the Integers
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Elliptic Curve Cryptosystems
- Monte Carlo Methods for Index Computation (mod p)
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Fully homomorphic encryption using ideal lattices
- How long does it take to catch a wild kangaroo?
- An Introduction to Mathematical Cryptography
- Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
- Chosen-Ciphertext Secure Fully Homomorphic Encryption