A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
暂无分享,去创建一个
[1] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[2] Berk Sunar,et al. Arithmetic Using Word-wise Homomorphic Encryption , 2016 .
[3] Kristian Gjøsteen,et al. The Norwegian Internet Voting Protocol , 2011, VoteID.
[4] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[5] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[6] Masahiro Yagisawa,et al. Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..
[7] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[8] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[9] Myungsun Kim,et al. Encoding Rational Numbers for FHE-based Applications , 2016, IACR Cryptol. ePrint Arch..
[10] Praveen Gauravaram,et al. Updates on Sorting of Fully Homomorphic Encrypted Data , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).
[11] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[12] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[13] Lee Naish,et al. Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting , 2009, IEEE Transactions on Information Forensics and Security.
[14] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[15] Ivan Damgård,et al. Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems , 2016, IACR Cryptol. ePrint Arch..
[16] Kristine Salamonsen. A Security Analysis of the Helios Voting Protocol and Application to the Norwegian County Election , 2014 .
[17] Nicolas Gama,et al. An Homomorphic LWE based E-voting Scheme , 2015 .
[18] Shai Halevi,et al. Bootstrapping for HElib , 2015, EUROCRYPT.
[19] Frederik Armknecht,et al. A Guide to Fully Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..
[20] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[21] Kristin E. Lauter. Practical applications of homomorphic encryption , 2012, CCSW '12.
[22] Myungsun Kim,et al. On the Efficiency of FHE-Based Private Queries , 2016, IEEE Transactions on Dependable and Secure Computing.
[23] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[24] Ivan Damgård,et al. Better Preprocessing for Secure Multiparty Computation , 2016, ACNS.
[25] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.