243 results on '"Gentry, Craig"'
Search Results
2. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
3. Random-Index PIR and Applications
4. YOSO: You Only Speak Once : Secure MPC with Stateless Ephemeral Roles
5. Can a Public Blockchain Keep a Secret?
6. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
7. Achievable CCA2 Relaxation for Homomorphic Encryption
8. Compressible FHE with Applications to PIR
9. Homomorphic Encryption for Finite Automata
10. A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
11. Random-Index PIR and Applications
12. YOSO: You Only Speak Once
13. Can a Public Blockchain Keep a Secret?
14. Cryptanalyses of Candidate Branching Program Obfuscators
15. Functional Encryption Without Obfuscation
16. Compressible FHE with Applications to PIR
17. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
18. Graph-Induced Multilinear Maps from Lattices
19. Private Database Access with HE-over-ORAM Architecture
20. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
21. Witness Encryption from Instance Independent Assumptions
22. Garbled RAM Revisited
23. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
24. Two-Round Secure MPC from Indistinguishability Obfuscation
25. A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
26. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
27. Discrete Gaussian Leftover Hash Lemma over Infinite Domains
28. Attribute-Based Encryption for Circuits from Multilinear Maps
29. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
30. Optimizing ORAM and Using It Efficiently for Secure Computation
31. Private Database Queries Using Somewhat Homomorphic Encryption
32. Quadratic Span Programs and Succinct NIZKs without PCPs
33. Candidate Multilinear Maps from Ideal Lattices
34. Packed Ciphertexts in LWE-Based Homomorphic Encryption
35. Ring Switching in BGV-Style Homomorphic Encryption
36. Homomorphic Evaluation of the AES Circuit
37. Better Bootstrapping in Fully Homomorphic Encryption
38. Fully Homomorphic Encryption with Polylog Overhead
39. Implementing Gentry’s Fully-Homomorphic Encryption Scheme
40. The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance
41. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
42. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
43. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness
44. A Simple BGN-Type Cryptosystem from LWE
45. Fully Homomorphic Encryption over the Integers
46. Secure Distributed Human Computation : (Extended Abstract)
47. Secure Distributed Human Computation : (Transcript of Discussion)
48. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
49. Hierarchical Identity Based Encryption with Polynomially Many Levels
50. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.