Attribute-based keyed fully homomorphic encryption
From MaRDI portal
Publication:6660543
DOI10.1007/978-3-031-71073-5_3MaRDI QIDQ6660543
Atsushi Takayasu, Keita Emura, Shingo Sato
Publication date: 10 January 2025
Cites Work
- Title not available (Why is that?)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
- The hunting of the SNARK
- Sub-linear lattice-based zero-knowledge arguments for arithmetic circuits
- Multi-key fully-homomorphic encryption in the plain model
- Keyed-fully homomorphic encryption without indistinguishability obfuscation
- Succinct arguments in the quantum random oracle model
- CCA-Secure Keyed-Fully Homomorphic Encryption
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- (Leveled) fully homomorphic encryption without bootstrapping
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Lattice-based FHE as secure as PKE
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Multi-key FHE from LWE, Revisited
- Targeted Homomorphic Attribute-Based Encryption
- Multi-identity and Multi-key Leveled FHE from Learning with Errors
- Efficient Lattice (H)IBE in the Standard Model
- Generic Transformation to Strongly Unforgeable Signatures
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
- Quadratic Span Programs and Succinct NIZKs without PCPs
- Fully homomorphic encryption using ideal lattices
- Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
- Advances in Cryptology - EUROCRYPT 2004
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Recursive composition and bootstrapping for SNARKS and proof-carrying data
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Two Round Multiparty Computation via Multi-key FHE
This page was built for publication: Attribute-based keyed fully homomorphic encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6660543)