Reusable garbled gates for new fully homomorphic encryption service
暂无分享,去创建一个
Xu An Wang | Fatos Xhafa | Jianfeng Ma | Yunfei Cao | Dianhua Tang | Xu An Wang | F. Xhafa | Jianfeng Ma | Dianhua Tang | Yunfei Cao
[1] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[2] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[3] Fabrice Kordon,et al. An approach for developing an interoperability mechanism between cloud providers , 2014, Int. J. Space Based Situated Comput..
[4] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[5] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[6] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[7] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[8] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[9] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[10] Haixia Xu,et al. A secure delegation scheme of large polynomial computation in multi-party cloud , 2015, Int. J. Grid Util. Comput..
[11] Vladimir Kolesnikov,et al. FleXOR: Flexible garbling for XOR gates that beats free-XOR , 2014, IACR Cryptol. ePrint Arch..
[12] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[13] Ying Wang,et al. Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..
[14] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[15] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2016, IEEE Transactions on Computers.
[16] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[17] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[18] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[19] Craig Gentry,et al. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits , 2014, EUROCRYPT.
[20] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[21] Patrick Traynor,et al. Secure outsourced garbled circuit evaluation for mobile devices , 2013, J. Comput. Secur..
[22] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[23] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[24] Xiaoyuan Yang,et al. Protecting data in cloud environment with attribute-based encryption , 2015, Int. J. Grid Util. Comput..
[25] Yehuda Lindell. Techniques for Efficient Secure Computation Based on Yao's Protocol , 2013, Public Key Cryptography.
[26] Guy N. Rothblum,et al. On Best-Possible Obfuscation , 2007, TCC.
[27] Joan Feigenbaum,et al. Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values , 2014, CCS.
[28] Elena Apostol,et al. A solution for the management of multimedia sessions in hybrid clouds , 2014, Int. J. Space Based Situated Comput..
[29] Craig Gentry,et al. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits , 2010, IACR Cryptol. ePrint Arch..
[30] Eric Miles,et al. Secure Obfuscation in a Weak Multilinear Map Model , 2016, TCC.
[31] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[32] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[33] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[34] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[35] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[36] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.