CCA1 secure FHE from PIO, revisited
暂无分享,去创建一个
[1] Frederik Vercauteren,et al. On CCA-Secure Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[2] Ran Canetti,et al. Obfuscation of Probabilistic Circuits and Applications , 2015, TCC.
[3] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[4] Robert H. Deng,et al. CCA-Secure Keyed-Fully Homomorphic Encryption , 2016, Public Key Cryptography.
[5] Ran Canetti,et al. Chosen-Ciphertext Secure Fully Homomorphic Encryption , 2017, Public Key Cryptography.
[6] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[7] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[8] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[9] Ron Rothblum,et al. Spooky Encryption and Its Applications , 2016, CRYPTO.
[10] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[11] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[12] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[13] Craig Gentry,et al. Better Bootstrapping in Fully Homomorphic Encryption , 2012, Public Key Cryptography.
[14] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[15] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2006 .
[16] Ricardo Dahab,et al. Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes , 2015, ICITS.
[17] David Cash,et al. Targeted Homomorphic Attribute-Based Encryption , 2016, TCC.
[18] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[19] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[20] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[21] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[22] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[23] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[24] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[25] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[26] Thomas Plantard,et al. On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers , 2012, ISPEC.
[27] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[28] Michael Clear,et al. Bootstrappable Identity-Based Fully Homomorphic Encryption , 2014, CANS.