Search

Your search keyword '"Gentry, Craig"' showing total 63 results

Search Constraints

Start Over You searched for: Author "Gentry, Craig" Remove constraint Author: "Gentry, Craig" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
63 results on '"Gentry, Craig"'

Search Results

1. Achievable CCA2 Relaxation for Homomorphic Encryption

3. Random-Index PIR and Applications

4. YOSO: You Only Speak Once : Secure MPC with Stateless Ephemeral Roles

5. Can a Public Blockchain Keep a Secret?

6. Compressible FHE with Applications to PIR

7. Homomorphic Encryption for Finite Automata

8. A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures

9. Cryptanalyses of Candidate Branching Program Obfuscators

10. Functional Encryption Without Obfuscation

11. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations

12. Graph-Induced Multilinear Maps from Lattices

13. Private Database Access with HE-over-ORAM Architecture

14. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input

15. Witness Encryption from Instance Independent Assumptions

16. Garbled RAM Revisited

17. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

18. Two-Round Secure MPC from Indistinguishability Obfuscation

19. Discrete Gaussian Leftover Hash Lemma over Infinite Domains

20. Attribute-Based Encryption for Circuits from Multilinear Maps

21. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based

22. Optimizing ORAM and Using It Efficiently for Secure Computation

23. Private Database Queries Using Somewhat Homomorphic Encryption

24. Quadratic Span Programs and Succinct NIZKs without PCPs

25. Candidate Multilinear Maps from Ideal Lattices

26. Packed Ciphertexts in LWE-Based Homomorphic Encryption

27. Ring Switching in BGV-Style Homomorphic Encryption

28. Homomorphic Evaluation of the AES Circuit

29. Better Bootstrapping in Fully Homomorphic Encryption

30. Fully Homomorphic Encryption with Polylog Overhead

31. Implementing Gentry’s Fully-Homomorphic Encryption Scheme

33. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

34. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits

35. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness

36. A Simple BGN-Type Cryptosystem from LWE

37. Fully Homomorphic Encryption over the Integers

38. Secure Distributed Human Computation : (Extended Abstract)

39. Secure Distributed Human Computation : (Transcript of Discussion)

40. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)

41. Hierarchical Identity Based Encryption with Polynomially Many Levels

42. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures

43. A Method for Making Password-Based Key Exchange Resilient to Server Compromise

44. Practical Identity-Based Encryption Without Random Oracles

45. Identity-Based Aggregate Signatures

47. Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs : (Extended Abstract)

48. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys

49. Single-Database Private Information Retrieval with Constant Communication Rate

50. Secure Distributed Human Computation

Catalog

Books, media, physical & digital resources