63 results on '"Gentry, Craig"'
Search Results
2. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
3. Random-Index PIR and Applications
4. YOSO: You Only Speak Once : Secure MPC with Stateless Ephemeral Roles
5. Can a Public Blockchain Keep a Secret?
6. Compressible FHE with Applications to PIR
7. Homomorphic Encryption for Finite Automata
8. A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
9. Cryptanalyses of Candidate Branching Program Obfuscators
10. Functional Encryption Without Obfuscation
11. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
12. Graph-Induced Multilinear Maps from Lattices
13. Private Database Access with HE-over-ORAM Architecture
14. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
15. Witness Encryption from Instance Independent Assumptions
16. Garbled RAM Revisited
17. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
18. Two-Round Secure MPC from Indistinguishability Obfuscation
19. Discrete Gaussian Leftover Hash Lemma over Infinite Domains
20. Attribute-Based Encryption for Circuits from Multilinear Maps
21. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
22. Optimizing ORAM and Using It Efficiently for Secure Computation
23. Private Database Queries Using Somewhat Homomorphic Encryption
24. Quadratic Span Programs and Succinct NIZKs without PCPs
25. Candidate Multilinear Maps from Ideal Lattices
26. Packed Ciphertexts in LWE-Based Homomorphic Encryption
27. Ring Switching in BGV-Style Homomorphic Encryption
28. Homomorphic Evaluation of the AES Circuit
29. Better Bootstrapping in Fully Homomorphic Encryption
30. Fully Homomorphic Encryption with Polylog Overhead
31. Implementing Gentry’s Fully-Homomorphic Encryption Scheme
32. The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance
33. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
34. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
35. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness
36. A Simple BGN-Type Cryptosystem from LWE
37. Fully Homomorphic Encryption over the Integers
38. Secure Distributed Human Computation : (Extended Abstract)
39. Secure Distributed Human Computation : (Transcript of Discussion)
40. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
41. Hierarchical Identity Based Encryption with Polynomially Many Levels
42. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures
43. A Method for Making Password-Based Key Exchange Resilient to Server Compromise
44. Practical Identity-Based Encryption Without Random Oracles
45. Identity-Based Aggregate Signatures
46. A System for End-to-End Authentication of Adaptive Multimedia Content
47. Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs : (Extended Abstract)
48. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
49. Single-Database Private Information Retrieval with Constant Communication Rate
50. Secure Distributed Human Computation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.