Controlled Homomorphic Encryption: Definition and Construction
暂无分享,去创建一个
[1] Craig Gentry,et al. Functional Encryption Without Obfuscation , 2016, TCC.
[2] Vinod Vaikuntanathan,et al. Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..
[3] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[4] Amit Sahai,et al. Functional Encryption for Randomized Functionalities , 2015, TCC.
[5] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[6] Brent Waters,et al. Targeted malleability: homomorphic encryption for restricted computations , 2012, ITCS '12.
[7] GentryCraig,et al. Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014 .
[8] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[9] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[10] Stefano Tessaro,et al. On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption , 2013, IMACC.
[11] Moni Naor,et al. On Cryptographic Assumptions and Challenges , 2003, CRYPTO.
[12] Kai-Min Chung,et al. On Extractability Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[13] Omer Paneth,et al. On the Achievability of Simulation-Based Security for Functional Encryption , 2013, CRYPTO.
[14] Vincenzo Iovino,et al. Simulation-Based Secure Functional Encryption in the Random Oracle Model , 2015, LATINCRYPT.
[15] Brent Waters,et al. A Punctured Programming Approach to Adaptively Secure Functional Encryption , 2015, CRYPTO.
[16] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[17] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[18] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[19] Yvo Desmedt,et al. Computer security by redefining what a computer is , 1993, NSPW '92-93.
[20] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[21] Vinod Vaikuntanathan,et al. Functional Encryption with Bounded Collusions via Multi-party Computation , 2012, CRYPTO.
[22] Abhi Shelat,et al. Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2006, CRYPTO.
[23] Manuel Barbosa,et al. Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation , 2012, CT-RSA.