搜索结果: 31-45 共查到“军事学 Fully Homomorphic Encryption”相关记录96条 . 查询时间(0.137 秒)
Fully homomorphic encryption must be fat or ugly?
fully homomorphic encryption characterisation
2016/2/23
In 1978, Rivest, Adleman and Dertouzos asked for algebraic
systems for which useful privacy homomorphisms exist. To date, the only
acknownledged result is noise based encryption combined with bootst...
Improved Fully Homomorphic Encryption with Composite Number Modulus
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis
2016/1/27
Gentry抯 bootstrapping technique is the most famous method
of obtaining fully homomorphic encryption. In previous work I proposed
a fully homomorphic encryption without bootstrapping which has the
w...
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
secret-key cryptography FHE
2016/1/27
Brakerski showed that linearly decryptable fully homomorphic encryption
(FHE) schemes cannot be secure in the chosen plaintext attack (CPA)
model. In this paper, we show that linearly decryptable FH...
Scale-Invariant Fully Homomorphic Encryption over the Integers
Fully Homomorphic Encryption Approximate-GCD Homomorphic AES
2016/1/26
At Crypto 2012, Brakerski constructed a scale-invariant fully homomorphic encryption
scheme based on the LWE problem, in which the same modulus is used throughout the evaluation
process, instead of ...
Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise
public-key cryptography fully homomorphic encryption group-based cryptography
2016/1/26
We propose constructions of fully homomorphic encryption completely different from the
previous work, using special kinds of non-commutative finite groups. Unlike the existing
schemes, our ciphertex...
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
secret-key cryptography symmetric fully homomorphic encryption
2016/1/23
The fully homomorphic symmetric encryption scheme MORE encrypts keys by conjugation with a random invertible matrix over an RSA modulus. We provide a two known-ciphertexts cryptanalysis recovering ...
Bootstrappable Identity-Based Fully Homomorphic Encryption
identity based encryption fully homomorphic encryption bootstrapping
2016/1/8
It has been an open problem for a number of years to construct an identity-based fully homomorphic
encryption (IBFHE) scheme (first mentioned by Naccache at CHES/CRYPTO 2010). At
CRYPTO 2013, Gentry...
A Fully Homomorphic Encryption Scheme with Better Key Size
Fully Homomorphic Encryption public key encryption Learning with error
2016/1/7
Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic
encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big que...
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
Fully homomorphic encryption non-binary message
2016/1/6
In this paper, we construct a fully homomorphic encryption (FHE) scheme over integers with the message space ZQ for any prime Q. Even for the binary case Q=2, our decryption circuit has a smaller degr...
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
fully homomorphic encryption identity-based ring learning with errors
2016/1/4
Fully homomorphic is an encryption scheme that allows for data to be stored and
processed in an encrypted format, which gives the cloud provider a solution to host and process
data without even know...
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Fully homomorphic encryption Adaptive security
2016/1/3
Fully homomorphic encryption (FHE) is a form of public-key encryption that enables arbitrary
computation over encrypted data. The past few years have seen several realizations of FHE
under different...
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
circular security fully homomorphic encryption LWE problem
2015/12/30
Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully
homomorphic encryption schemes share two common flaws that they all use large-scale secret ...
Practical Fully Homomorphic Encryption without Noise Reduction
Fully Homomorphic Encryption Implementation
2015/12/30
We present a new fully homomorphic encryption (FHE) scheme
that is efficient for practical applications. The main feature of our scheme
is that noise reduction considered essential in current FHE sc...
Fully Homomorphic Encryption without bootstrapping
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis
2015/12/30
Gentry抯 bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In this paper I propose a new fully homomorphic encryption scheme on non-associative octonion ring ...
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
public-key cryptography fully homomorphic encryption
2015/12/30
Recently, IACR ePrint archive posted two fully homomorphic encryption
schemes without bootstrapping. In this note, we show that these schemes are
trivially insecure. Furthermore, we also show that t...