搜索结果: 46-60 共查到“军事学 Fully Homomorphic Encryption”相关记录96条 . 查询时间(0.165 秒)
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Non-commutative rings Noise-free Symmetric-FHE Verifiable FHE
2015/12/29
A framework of noise-free symmetric fully homomorphic encryption (FHE) is proposed in this work. Dierent from the frameworks that are dened over non-commutative groups, our framework is constructed ...
Fully Homomorphic Encryption on Octonion Ring
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis,
2015/12/24
In previous work I proposed a fully homomorphic
encryption without bootstrapping which has the weak point in the
enciphering function. In this paper I propose the improved fully
homomorphic encrypt...
Fully Homomorphic Encryption with Composite Number Modulus
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis
2015/12/22
Gentry抯 bootstrapping technique is the most famous method
of obtaining fully homomorphic encryption. In previous work I proposed a
fully homomorphic encryption without bootstrapping which has the we...
A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE
Fully Homomorphic Encryption Public Key Encryption Multi-Bit Plaintext
2015/12/21
The efficiency of fully homomorphic encryption is a big question at present. To improve efficiency of fully homomorphic encryption,
we use the technique of packed ciphertext to construct a multi-bit ...
A Guide to Fully Homomorphic Encryption
public-key cryptography Fully Homomorphic Encryption Applications of (Fully) Homomorphic Encryption
2015/12/18
Fully homomorphic encryption (FHE) has been dubbed the holy grail
of cryptography, an elusive goal which could solve the IT world’s problems
of security and trust. Research in the area exploded afte...
We construct the first leakage resilient variants of fully homomorphic encryption (FHE) schemes. Our leakage model is bounded adaptive leakage resilience. We first construct a leakage- resilient level...
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
Fully Homomorphic Encryption FPGA
2014/3/7
A fully homomorphic encryption (FHE) scheme is envisioned as being a key cryptographic tool in building a secure and reliable cloud computing environment, as it allows arbitrarily evaluation of a ciph...
Fully Homomorphic Encryption for Mathematicians
Fully Homomorphic Encryption Mathematicians
2014/3/13
We give an introduction to Fully Homomorphic Encryption for mathematicians. Fully Homomorphic Encryption allows untrusted parties to take encrypted data Enc(m_1),...,Enc(m_t) and any efficiently compu...
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
Fully Homomorphic Encryption Multi-Scheme FHE Trivial Encryptions Ciphertext Trees Multiparty Computations
2013/4/18
We consider the problem of evaluating circuits whose inputs are encrypted with possibly different encryption schemes. Let $\mathcal{C}$ be any circuit with input $x_1, \dots, x_t \in \{0,1\}$, and let...
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
On-the-Fly Multiparty Computation
2013/4/18
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted "cloud" server. In this notion that we call on-the-fly multiparty computation (MPC), the clou...
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Leveled homomorphic encryption fully homomorphic encryption ring learning with errors
2013/4/18
In 1996, Hoffstein, Pipher and Silverman introduced an efficient lattice based encryption scheme dubbed NTRUEncrypt. Unfortunately, this scheme lacks a proof of security. However, in 2011, Stehle and ...
CRT-based Fully Homomorphic Encryption over the Integers
public-key cryptography privacy homomorphism Chinese remainder theorem
2013/2/21
In 1978, Rivest, Adleman and Dertouzos introduced the basic concept of privacy homomorphism that allows computation on encrypted data without decryption. It was elegant work that precedes the recent d...
Batch Fully Homomorphic Encryption over the Integers
public-key cryptography / Fully Homomorphic Encryption Batch Encryption Homomorphic AES
2013/2/21
We extend the fully homomorphic encryption scheme over the integers of van Dijk et al. (DGHV) to batch fully homomorphic encryption, i.e. to a scheme that supports encrypting and homomorphically proce...
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
public-key cryptography / Fully Homomorphic Encryption
2012/3/26
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan's (DGHV) fully homomorphic scheme over the integers from \lambda^7 to \lambda^5. Our...
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption
Fully Homomorphic Encryption Cryptanalysis Principal Ideal Lattice Lattice Reduction
2012/3/27
For the fully homomorphic encryption schemes in [SV10, GH11], this paper presents attacks to solve equivalent secret key and directly recover plaintext from ciphertext for lattice dimensions n=2048 by...