Parallel Homomorphic Encryption
暂无分享,去创建一个
[1] David Yarowsky,et al. Ranking and Semi-supervised Classification on Large Scale Graphs Using Map-Reduce , 2009, Graph-based Methods for Natural Language Processing.
[2] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[3] Ravi Kumar,et al. Max-cover in map-reduce , 2010, WWW '10.
[4] Yuval Ishai,et al. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials , 2002, ICALP.
[5] Christos Faloutsos,et al. PEGASUS: A Peta-Scale Graph Mining System Implementation and Observations , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[6] Yuan Yu,et al. Dryad: distributed data-parallel programs from sequential building blocks , 2007, EuroSys '07.
[7] Rafail Ostrovsky,et al. Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[8] Abhinandan Das,et al. Google news personalization: scalable online collaborative filtering , 2007, WWW '07.
[9] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[10] Cryptography with constant input locality , 2007, CRYPTO 2007.
[11] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[12] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[13] Craig Gentry,et al. A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.
[14] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[15] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[16] Jimmy J. Lin,et al. Design patterns for efficient graph algorithms in MapReduce , 2010, MLG '10.
[17] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[18] Allan Borodin,et al. On Relating Time and Space to Size and Depth , 1977, SIAM J. Comput..
[19] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[20] Steven Fortune,et al. Parallelism in random access machines , 1978, STOC.
[21] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[22] Richard M. Karp,et al. Parallel Algorithms for Shared-Memory Machines , 1991, Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity.
[23] Craig Gentry,et al. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits , 2010, IACR Cryptol. ePrint Arch..
[24] Moni Naor,et al. Oblivious Polynomial Evaluation , 2006, SIAM J. Comput..
[25] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[26] Yuval Ishai,et al. COMPUTATIONALLY PRIVATE RANDOMIZING POLYNOMIALS AND THEIR APPLICATIONS , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[27] Leslie G. Valiant,et al. A bridging model for parallel computation , 1990, CACM.
[28] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[29] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[30] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[31] B. Applebaum. Cryptography in NC0 , 2014 .
[32] Anat Paskin-Cherniavsky,et al. Evaluating Branching Programs on Encrypted Data , 2007, TCC.
[33] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[34] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[35] Ramesh Subramonian,et al. LogP: a practical model of parallel computation , 1996, CACM.
[36] Sergei Vassilvitskii,et al. A model of computation for MapReduce , 2010, SODA '10.
[37] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[38] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[39] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[40] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[41] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[42] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[43] Kunle Olukotun,et al. Map-Reduce for Machine Learning on Multicore , 2006, NIPS.
[44] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[45] Yuval Ishai,et al. On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.
[46] G ValiantLeslie. A bridging model for parallel computation , 1990 .
[47] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[48] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.