Sciweavers

IJNSEC
2008
140views more  IJNSEC 2008»
13 years 11 months ago
Distributed Paillier Plaintext Equivalence Test
Consider the following scenario with N + 2 parties, A, B, X1, X2,
Pei-Yih Ting, Xiao-Wei Huang
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
14 years 17 days ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
PKC
2010
Springer
193views Cryptology» more  PKC 2010»
14 years 3 months ago
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction follows that of Gentry by producing a fully homomorphic s...
Nigel P. Smart, Frederik Vercauteren
CCS
1998
ACM
14 years 3 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
14 years 6 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry