skip to main content
A fully homomorphic encryption scheme
Publisher:
  • Stanford University
  • 408 Panama Mall, Suite 217
  • Stanford
  • CA
  • United States
ISBN:978-1-109-44450-6
Order Number:AAI3382729
Pages:
199
Bibliometrics
Skip Abstract Section
Abstract

We propose the first fully homomorphic encryption scheme, solving an old open problem. Such a scheme allows one to compute arbitrary functions over encrypted data without the decryption key—i.e., given encryptions E ( m 1), ..., E ( m t ) of m 1, ..., m t, one can efficiently compute a compact ciphertext that encrypts f ( m 1, ..., m t ) for any efficiently computable function f .

Fully homomorphic encryption has numerous applications. For example, it enables encrypted search engine queries—i.e., a search engine can give you a succinct encrypted answer to your (boolean) query without even knowing what your query was. It also enables searching on encrypted data; you can store your encrypted data on a remote server, and later have the server retrieve only files that (when decrypted) satisfy some boolean constraint, even though the server cannot decrypt the files on its own. More broadly, it improves the efficiency of secure multiparty computation.

In our solution, we begin by designing a somewhat homomorphic "boostrappable" encryption scheme that works when the function f is the scheme's own decryption function. We then show how, through recursive self-embedding, bootstrappable encryption gives fully homomorphic encryption.

Cited By

  1. ACM
    Liu J, Zhou J, Tian J and Sun W (2024). Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples, ACM Transactions on Multimedia Computing, Communications, and Applications, 20:7, (1-27), Online publication date: 31-Jul-2024.
  2. ACM
    Zhang X, Fan L, Wang S, Li W, Chen K and Yang Q (2024). A Game-theoretic Framework for Privacy-preserving Federated Learning, ACM Transactions on Intelligent Systems and Technology, 15:3, (1-35), Online publication date: 30-Jun-2024.
  3. ACM
    Zhang X, Kang Y, Fan L, Chen K and Yang Q (2024). A Meta-Learning Framework for Tuning Parameters of Protection Mechanisms in Trustworthy Federated Learning, ACM Transactions on Intelligent Systems and Technology, 15:3, (1-36), Online publication date: 30-Jun-2024.
  4. ACM
    Yang W, Wu S, Fei J, Zeng X, Ding Y and Xia Z (2024). A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things, ACM Transactions on Multimedia Computing, Communications, and Applications, 20:6, (1-23), Online publication date: 30-Jun-2024.
  5. ACM
    Lee Y, Cheon S, Kim D, Lee D and Kim H Performance-aware Scale Analysis with Reserve for Homomorphic Encryption Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1, (302-317)
  6. Nakamura T, Okada H, Fukushima K and Isohara T (2024). Private Verification in Multi-stakeholder Environment and its Application to Stable Matching, SN Computer Science, 5:3, Online publication date: 9-Mar-2024.
  7. Matsuoka K, Bian S and Sato T HOGE : Homomorphic Gate on an FPGA Proceedings of the 29th Asia and South Pacific Design Automation Conference, (325-332)
  8. Zhou Z, Wan Y, Cui Q, Yu K, Mumtaz S, Yang C and Guizani M (2024). Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks, IEEE Transactions on Wireless Communications, 23:1, (423-435), Online publication date: 1-Jan-2024.
  9. Tan W, Chiu S, Wang A, Lao Y and Parhi K (2024). PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption, IEEE Transactions on Information Forensics and Security, 19, (1646-1659), Online publication date: 1-Jan-2024.
  10. Cheng K, Xi N, Liu X, Zhu X, Gao H, Zhang Z and Shen Y (2023). Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization, IEEE Transactions on Computers, 72:12, (3519-3531), Online publication date: 1-Dec-2023.
  11. Cabrero-Holgueras J and Pastrana S (2023). Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming▪, Expert Systems with Applications: An International Journal, 229:PA, Online publication date: 1-Nov-2023.
  12. ACM
    Müllner P, Lex E, Schedl M and Kowald D (2023). ReuseKNN: Neighborhood Reuse for Differentially Private KNN-Based Recommendations, ACM Transactions on Intelligent Systems and Technology, 14:5, (1-29), Online publication date: 31-Oct-2023.
  13. ACM
    Xiao Y, Weng C, Yu R, Liu P, Varvello M and Kuzmanovic A Demo: PDNS: A Fully Privacy-Preserving DNS Proceedings of the ACM SIGCOMM 2023 Conference, (1182-1184)
  14. Saputra Y, Nguyen D, Hoang D, Pham Q, Dutkiewicz E and Hwang W (2023). Federated Learning Framework With Straggling Mitigation and Privacy-Awareness for AI-Based Mobile Application Services, IEEE Transactions on Mobile Computing, 22:9, (5296-5312), Online publication date: 1-Sep-2023.
  15. ACM
    Heinl M, Gölz S and Bösch C (2022). Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey, ACM Computing Surveys, 55:8, (1-44), Online publication date: 31-Aug-2023.
  16. Lee Y, Cheon S, Kim D, Lee D and Kim H ELASM Proceedings of the 32nd USENIX Conference on Security Symposium, (4697-4714)
  17. Parbat T and Chatterjee A (2023). Authorized Update in Multi-User Homomorphic Encrypted Cloud Database, IEEE Transactions on Knowledge and Data Engineering, 35:8, (7796-7808), Online publication date: 1-Aug-2023.
  18. Hariss K and Noura H (2023). Homomorphic additive lightweight block cipher scheme for securing IoT applications, Journal of Information Security and Applications, 76:C, Online publication date: 1-Aug-2023.
  19. Luo F, Wang H, Saif A and Han W (2023). Multi-key Fully Homomorphic Encryption without CRS from RLWE, Computer Standards & Interfaces, 86:C, Online publication date: 1-Aug-2023.
  20. Morales D, Agudo I and Lopez J (2023). Private set intersection, Computer Science Review, 49:C, Online publication date: 1-Aug-2023.
  21. ACM
    Huang P, Tu C, Chung S, Wu P, Tsai T, Lin Y, Dai C and Liao T (2023). SecureTVM: A TVM-based Compiler Framework for Selective Privacy-preserving Neural Inference, ACM Transactions on Design Automation of Electronic Systems, 28:4, (1-28), Online publication date: 31-Jul-2023.
  22. Mono J, Marcolla C, Land G, Güneysu T and Aaraj N Finding and Evaluating Parameters for BGV Progress in Cryptology - AFRICACRYPT 2023, (370-394)
  23. Shaw S and Dutta R (2023). Forward Secure Offline Assisted Group Key Exchange From Isogeny-Based Blinded Key Encapsulation Mechanism, IEEE Transactions on Information Theory, 69:7, (4708-4722), Online publication date: 1-Jul-2023.
  24. ACM
    Hu D, Wang Q, Yan S, Liu X, Li M and Zheng S (2023). Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing, ACM Transactions on Database Systems, 48:2, (1-25), Online publication date: 30-Jun-2023.
  25. Maliszewski K, Quiané-Ruiz J and Markl V (2023). Cracking-Like Join for Trusted Execution Environments, Proceedings of the VLDB Endowment, 16:9, (2330-2343), Online publication date: 1-May-2023.
  26. ACM
    Gorantala S, Springer R and Gipson B (2023). Unlocking the Potential of Fully Homomorphic Encryption, Communications of the ACM, 66:5, (72-81), Online publication date: 1-May-2023.
  27. Paul B, Yadav T, Singh B, Krishnaswamy S and Trivedi G (2023). A Resource Efficient Software-Hardware Co-Design of Lattice-Based Homomorphic Encryption Scheme on the FPGA, IEEE Transactions on Computers, 72:5, (1247-1260), Online publication date: 1-May-2023.
  28. El Mokadem R, Ben Maissa Y and El Akkaoui Z (2023). Federated learning for energy constrained devices: a systematic mapping study, Cluster Computing, 26:2, (1685-1708), Online publication date: 1-Apr-2023.
  29. ACM
    Zhang X, Gu H, Fan L, Chen K and Yang Q (2022). No Free Lunch Theorem for Security and Utility in Federated Learning, ACM Transactions on Intelligent Systems and Technology, 14:1, (1-35), Online publication date: 28-Feb-2023.
  30. Li X, Li F and Gao M (2023). Flare: A Fast, Secure, and Memory-Efficient Distributed Analytics Framework, Proceedings of the VLDB Endowment, 16:6, (1439-1452), Online publication date: 1-Feb-2023.
  31. Zhao D, Ding H, Li Z, Zhang Z, Li Z, Gao J and Zhang L (2023). CRT-Based Homomorphic Encryption over the Fraction, Security and Communication Networks, 2023, Online publication date: 1-Jan-2023.
  32. Liu X, Yang G, Susilo W, He K, Deng R and Weng J (2023). Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits, IEEE Transactions on Information Forensics and Security, 18, (4929-4943), Online publication date: 1-Jan-2023.
  33. Tang K, Li P, Song Y and Luo T (2022). Reconciling privacy and utility: an unscented Kalman filter-based framework for differentially private machine learning, Machine Language, 112:1, (311-351), Online publication date: 1-Jan-2023.
  34. Teranishi K, Shimada N and Kogiso K Stability Analysis and Dynamic Quantizer for Controller Encryption 2019 IEEE 58th Conference on Decision and Control (CDC), (7184-7189)
  35. Falzon F, Markatou E, Espiritu Z and Tamassia R (2022). Range Search over Encrypted Multi-Attribute Data, Proceedings of the VLDB Endowment, 16:4, (587-600), Online publication date: 1-Dec-2022.
  36. Vallabhadas D and Sandhya M (2022). Securing multimodal biometric template using local random projection and homomorphic encryption, Journal of Information Security and Applications, 70:C, Online publication date: 1-Nov-2022.
  37. ACM
    Xie L, Liu J, Lu S, Chang T and Shi Q (2022). An Efficient Learning Framework for Federated XGBoost Using Secret Sharing and Distributed Optimization, ACM Transactions on Intelligent Systems and Technology, 13:5, (1-28), Online publication date: 31-Oct-2022.
  38. ACM
    Mazonka O, Chielle E, Soni D and Maniatakos M Fast and Compact Interleaved Modular Multiplication Based on Carry Save Addition Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, (1-9)
  39. ACM
    Sun L, Li H, Peng Y and Cui J Serpens: Privacy-Preserving Inference through Conditional Separable of Convolutional Neural Networks Proceedings of the 31st ACM International Conference on Information & Knowledge Management, (1837-1847)
  40. Jia H, Aldeen M, Zhao C, Jing S and Chen Z (2022). Flexible privacy‐preserving machine learning, International Journal of Intelligent Systems, 37:11, (9173-9191), Online publication date: 26-Sep-2022.
  41. ACM
    Shin H, Koo D and Hur J (2022). Secure and Efficient Hybrid Data Deduplication in Edge Computing, ACM Transactions on Internet Technology, 22:3, (1-25), Online publication date: 31-Aug-2022.
  42. ACM
    Akavia A, Leibovich M, Resheff Y, Ron R, Shahar M and Vald M (2022). Privacy-Preserving Decision Trees Training and Prediction, ACM Transactions on Privacy and Security, 25:3, (1-30), Online publication date: 31-Aug-2022.
  43. ACM
    Morimura K, Maeda D and Nishide T Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-10)
  44. Ma J, Naas S, Sigg S and Lyu X (2022). Privacy‐preserving federated learning based on multi‐key homomorphic encryption, International Journal of Intelligent Systems, 37:9, (5880-5901), Online publication date: 30-Jul-2022.
  45. Xia S, Zhu Z, Zhu C, Zhao J, Chard K, Elmore A, Foster I, Franklin M, Krishnan S and Fernandez R (2022). Data station, Proceedings of the VLDB Endowment, 15:11, (3172-3185), Online publication date: 1-Jul-2022.
  46. Feldmann A, Samardzic N, Krastev A, Devadas S, Dreslinski R, Peikert C and Sanchez D (2022). An Architecture to Accelerate Computation on Encrypted Data, IEEE Micro, 42:4, (59-68), Online publication date: 1-Jul-2022.
  47. ACM
    Wu N, Cheng R, Chen S and Han B Preserving privacy in mobile spatial computing Proceedings of the 32nd Workshop on Network and Operating Systems Support for Digital Audio and Video, (1-7)
  48. ACM
    Yang Y, Kuppannagari S, Kannan R and Prasanna V NTTGen Proceedings of the 19th ACM International Conference on Computing Frontiers, (30-39)
  49. ACM
    Ahmadjee S, Mera-Gómez C, Bahsoon R and Kazman R (2022). A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats, ACM Transactions on Software Engineering and Methodology, 31:2, (1-45), Online publication date: 30-Apr-2022.
  50. ACM
    Kalloori S and Klingler S Cross-silo federated learning based decision trees Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (1117-1124)
  51. Özerk Ö, Elgezen C, Mert A, Öztürk E and Savaş E (2022). Efficient number theoretic transform implementation on GPU for homomorphic encryption, The Journal of Supercomputing, 78:2, (2840-2872), Online publication date: 1-Feb-2022.
  52. ACM
    Sharma S and Mehrotra S Cryptographic Techniques for Data Processing Proceedings of the 5th Joint International Conference on Data Science & Management of Data (9th ACM IKDD CODS and 27th COMAD), (344-347)
  53. Wang Z, Cheng X, Su S, Wang L and Karuppiah M (2022). Achieving Private and Fair Truth Discovery in Crowdsourcing Systems, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  54. Sun D, Huang H, Zheng D, Hu H, Bi C, Wang R and Mahmood T (2022). Face Security Authentication System Based on Deep Learning and Homomorphic Encryption, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  55. Sun Y, Yin L, Ma Y, Wang C and Liu X (2022). IoV-SDCM, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  56. Miao Y, Liu Z, Li H, Choo K and Deng R (2022). Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems, IEEE Transactions on Information Forensics and Security, 17, (2848-2861), Online publication date: 1-Jan-2022.
  57. Verma P, Mathuria A and Dasgupta S Faster Private Rating Update via Integer-Based Homomorphic Encryption Information Systems Security, (218-236)
  58. Fauser M and Zhang P Resilient Homomorphic Encryption Scheme for Cyber-Physical Systems 2021 60th IEEE Conference on Decision and Control (CDC), (5634-5639)
  59. Hossienalizadeh T, Turkmen F and Monshizadeh N Private Computation of Polynomials over Networks 2021 60th IEEE Conference on Decision and Control (CDC), (4895-4900)
  60. ACM
    Yan Q, Lou J, Vuran M and Irmak S (2021). Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems, ACM Transactions on Sensor Networks, 17:4, (1-30), Online publication date: 30-Nov-2021.
  61. ACM
    Matsuoka K, Hoshizuki Y, Sato T and Bian S Towards Better Standard Cell Library Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, (63-68)
  62. ACM
    Ibarrondo A and Viand A Pyfhel Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, (11-16)
  63. ACM
    Meng X, Papadopoulos D, Oprea A and Triandopoulos N Private Hierarchical Clustering and Efficient Approximation Proceedings of the 2021 on Cloud Computing Security Workshop, (3-20)
  64. ACM
    Ishai Y, Su H and Wu D Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (212-234)
  65. ACM
    Markatou E, Falzon F, Tamassia R and Schor W Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2243-2261)
  66. Truong N, Sun K, Wang S, Guitton F and Guo Y (2021). Privacy preservation in federated learning, Computers and Security, 110:C, Online publication date: 1-Nov-2021.
  67. ACM
    Wang Q, Chen S and Xiang Y (2021). Anonymous Blockchain-based System for Consortium, ACM Transactions on Management Information Systems, 12:3, (1-25), Online publication date: 30-Sep-2021.
  68. Tawalbeh L and Saldamli G (2021). Reconsidering big data security and privacy in cloud and mobile cloud systems, Journal of King Saud University - Computer and Information Sciences, 33:7, (810-819), Online publication date: 1-Sep-2021.
  69. Sun C, Wu A and Hwang T (2021). A novel privacy-preserving deep learning scheme without a cryptography component, Computers and Electrical Engineering, 94:C, Online publication date: 1-Sep-2021.
  70. ACM
    Huang A, Liu Y, Chen T, Zhou Y, Sun Q, Chai H and Yang Q (2021). StarFL: Hybrid Federated Learning Architecture for Smart Urban Computing, ACM Transactions on Intelligent Systems and Technology, 12:4, (1-23), Online publication date: 31-Aug-2021.
  71. Cooper S, Di Fava A, Villacañas Ó, Silva T, Fernandez-Carbajales V, Unzueta L, Serras M, Marchionni L and Ferro F Social robotic application to support active and healthy ageing 2021 30th IEEE International Conference on Robot & Human Interactive Communication (RO-MAN), (1074-1080)
  72. ACM
    Wood A, Najarian K and Kahrobaei D (2020). Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics, ACM Computing Surveys, 53:4, (1-35), Online publication date: 31-Jul-2021.
  73. Zhang B, Cheng Z and Pedram M A high-performance low-power barrett modular multiplier for cryptosystems Proceedings of the ACM/IEEE International Symposium on Low Power Electronics and Design, (1-6)
  74. ACM
    Fei S, Yan Z, Ding W and Xie H (2021). Security Vulnerabilities of SGX and Countermeasures, ACM Computing Surveys, 54:6, (1-36), Online publication date: 1-Jul-2021.
  75. ACM
    Malik R, Singhal V, Gottfried B and Kulkarni M Vectorized secure evaluation of decision forests Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (1049-1063)
  76. ACM
    Yue Z, Ding S, Zhao L, Zhang Y, Cao Z, Tanveer M, Jolfaei A and Zheng X (2021). Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework, ACM Transactions on Internet Technology, 21:3, (1-21), Online publication date: 15-Jun-2021.
  77. Benedito O, Delgado-Gonzalo R and Schiavoni V KeVlar-Tz: A Secure Cache for Arm TrustZone Distributed Applications and Interoperable Systems, (109-124)
  78. Fan Y, Liu J, Li K, liang W, Lei X, Tan G and Tang M (2021). One enhanced secure access scheme for outsourced data, Information Sciences: an International Journal, 561:C, (230-242), Online publication date: 1-Jun-2021.
  79. ACM
    Bozdemir B, Canard S, Ermis O, Möllering H, Önen M and Schneider T Privacy-preserving Density-based Clustering Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, (658-671)
  80. ACM
    Agrawal N, Binns R, Van Kleek M, Laine K and Shadbolt N Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, (1-13)
  81. Mansour A, Malik K, Alkaff A and Kanaan H (2021). ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs, IEEE Transactions on Intelligent Transportation Systems, 22:3, (1663-1678), Online publication date: 1-Mar-2021.
  82. Shen X, Huang C, Liu D, Xue L, Zhuang W, Sun R and Ying B (2021). Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation, IEEE Network: The Magazine of Global Internetworking, 35:1, (8-15), Online publication date: 1-Mar-2021.
  83. Yoo J, Yoon J and Son J (2021). t-BMPNet, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  84. Mai G, Cao K, Lan X and Yuen P (2020). SecureFace: Face Template Protection, IEEE Transactions on Information Forensics and Security, 16, (262-277), Online publication date: 1-Jan-2021.
  85. Alexandru A, Tsiamis A and Pappas G Towards Private Data-driven Control 2020 59th IEEE Conference on Decision and Control (CDC), (5449-5456)
  86. Fauser M and Zhang P Resilience of Cyber-Physical Systems to Covert Attacks by Exploiting an Improved Encryption Scheme 2020 59th IEEE Conference on Decision and Control (CDC), (5489-5494)
  87. So J, Guler B and Avestimehr A A scalable approach for privacy-preserving collaborative machine learning Proceedings of the 34th International Conference on Neural Information Processing Systems, (8054-8066)
  88. Lou Q, Lu W, Hong C and Jiang L Falcon Proceedings of the 34th International Conference on Neural Information Processing Systems, (2364-2374)
  89. ACM
    Yuan L and Shen G A Training Scheme of Deep Neural Networks on Encrypted Data Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, (490-495)
  90. ACM
    Mehrotra S, Sharma S, Ullman J, Ghosh D, Gupta P and Mishra A (2020). PANDA, ACM Transactions on Management Information Systems, 11:4, (1-41), Online publication date: 4-Dec-2020.
  91. Yadav V, Anand A, Verma S and Venkatesan S (2019). Private computation of the Schulze voting method over the cloud, Cluster Computing, 23:4, (2517-2531), Online publication date: 1-Dec-2020.
  92. Dalla Preda M, Giacobazzi R and Marastoni N Formal Framework for Reasoning About the Precision of Dynamic Analysis Static Analysis, (178-199)
  93. ACM
    Chen C, Zhou J, Wu B, Fang W, Wang L, Qi Y and Zheng X (2020). Practical Privacy Preserving POI Recommendation, ACM Transactions on Intelligent Systems and Technology, 11:5, (1-20), Online publication date: 31-Oct-2020.
  94. Lu C, Miao F, Hou J, Su Z and Xiong Y (2020). Quantum multiparty cryptosystems based on a homomorphic random basis encryption, Quantum Information Processing, 19:9, Online publication date: 12-Sep-2020.
  95. Dutta P, Susilo W, Duong D, Baek J and Roy P Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction Information Security Applications, (245-257)
  96. ACM
    Boemer F, Cammarota R, Demmler D, Schneider T and Yalame H MP2ML Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-10)
  97. El Rifai O, Biotteau M, de Boissezon X, Megdiche I, Ravat F and Teste O Blockchain-Based Federated Learning in Medicine Artificial Intelligence in Medicine, (214-224)
  98. ACM
    Li J and Huang H Faster Secure Data Mining via Distributed Homomorphic Encryption Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (2706-2714)
  99. Gouert C and Tsoutsos N Romeo Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
  100. Teranishi K, Kogiso K and Ueda J Encrypted Feedback Linearization and Motion Control for Manipulator with Somewhat Homomorphic Encryption 2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), (613-618)
  101. D’Anvers J, Rossi M and Virdia F (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes Advances in Cryptology – EUROCRYPT 2020, (3-33)
  102. Di Francesco Maesa D and Mori P (2020). Blockchain 3.0 applications survey, Journal of Parallel and Distributed Computing, 138:C, (99-114), Online publication date: 1-Apr-2020.
  103. Zhao Y, Tarus S, Yang L, Sun J, Ge Y and Wang J (2020). Privacy-preserving clustering for big data in cyber-physical-social systems, Information Sciences: an International Journal, 515:C, (132-155), Online publication date: 1-Apr-2020.
  104. ACM
    Mehrotra S and Sharma S Recent Advances in Information-Theoretically Secure Data Outsourcing Proceedings of the Sixth International Workshop on Security and Privacy Analytics, (31-32)
  105. ACM
    Ugwuoke C, Erkin Z, Reinders M and Lagendijk R PREDICT Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, (329-340)
  106. Li D, Liao X, Xiang T, Wu J and Le J (2020). Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation, Computers and Security, 90:C, Online publication date: 1-Mar-2020.
  107. ACM
    Pal A and Kant K (2020). Smart Sensing, Communication, and Control in Perishable Food Supply Chain, ACM Transactions on Sensor Networks, 16:1, (1-41), Online publication date: 29-Feb-2020.
  108. Yamane M and Iwamura K Secure and Efficient Outsourcing of Matrix Multiplication based on Secret Sharing Scheme using only One Server 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), (1-6)
  109. Cheng W, Ou W, Yin X, Yan W, Liu D, Liu C and Gao H (2020). A Privacy-Protection Model for Patients, Security and Communication Networks, 2020, Online publication date: 1-Jan-2020.
  110. Shamsabadi A, Gascón A, Haddadi H and Cavallaro A (2020). PrivEdge: From Local to Distributed Private Training and Prediction, IEEE Transactions on Information Forensics and Security, 15, (3819-3831), Online publication date: 1-Jan-2020.
  111. Gong M, Feng J and Xie Y (2022). Privacy-enhanced multi-party deep learning, Neural Networks, 121:C, (484-496), Online publication date: 1-Jan-2020.
  112. Li T, Li X, Zhong X, Jiang N and Gao C (2019). Communication-efficient outsourced privacy-preserving classification service using trusted processor, Information Sciences: an International Journal, 505:C, (473-486), Online publication date: 1-Dec-2019.
  113. Cai Y, Karakostas G and Wassyng A (2019). Secure and trusted partial grey-box verification, International Journal of Information Security, 18:6, (677-700), Online publication date: 1-Dec-2019.
  114. Hu Y, Trachtenberg A and Ishwar P Collaborative Privacy for Web Applications 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (460-469)
  115. Rahman M, Khalil I, Alabdulatif A and Yi X (2019). Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform, Knowledge-Based Systems, 180:C, (104-115), Online publication date: 15-Sep-2019.
  116. Pandiaraja P and Deepa N (2019). A Novel Data Privacy-Preserving Protocol for Multi-data Users by using genetic algorithm, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:18, (8539-8553), Online publication date: 1-Sep-2019.
  117. ACM
    Mainali P, Shepherd C and Petitcolas F Privacy-Enhancing Context Authentication from Location-Sensitive Data Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-10)
  118. ACM
    Acar A, Aksu H, Uluagac A and Conti M (2018). A Survey on Homomorphic Encryption Schemes, ACM Computing Surveys, 51:4, (1-35), Online publication date: 31-Jul-2019.
  119. ACM
    Xie Q, Hou Y, Cheng K, Dagher G, Wang L and Yu S Flexibly and Securely Shape Your Data Disclosed to Others Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, (160-167)
  120. El-Yahyaoui A and El Kettani M (2020). About Fully Homomorphic Encryption Improvement Techniques, International Journal of Embedded and Real-Time Communication Systems, 10:3, (1-20), Online publication date: 1-Jul-2019.
  121. Raisaro J, Troncoso-Pastoriza J, Misbach M, Sousa J, Pradervand S, Missiaglia E, Michielin O, Ford B and Hubaux J (2019). MedCo, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16:4, (1328-1341), Online publication date: 1-Jul-2019.
  122. Di Francesco Maesa D, Mori P and Ricci L (2019). A blockchain based approach for the definition of auditable Access Control systems, Computers and Security, 84:C, (93-119), Online publication date: 1-Jul-2019.
  123. Sultan S (2019). Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes, Computers and Security, 84:C, (148-165), Online publication date: 1-Jul-2019.
  124. Jiang H, Wang H, Zheng Z and Xu Q (2019). Privacy preserved wireless sensor location protocols based on mobile edge computing, Computers and Security, 84:C, (393-401), Online publication date: 1-Jul-2019.
  125. ACM
    Bitansky N, Khurana D and Paneth O Weak zero-knowledge beyond the black-box barrier Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, (1091-1102)
  126. ACM
    Chakarov D and Papazov Y Evaluation of the Complexity of Fully Homomorphic Encryption Schemes in Implementations of Programs Proceedings of the 20th International Conference on Computer Systems and Technologies, (62-67)
  127. Wang Z and Ling C (2019). Lattice Gaussian Sampling by Markov Chain Monte Carlo, IEEE Transactions on Information Theory, 65:6, (3630-3645), Online publication date: 1-Jun-2019.
  128. Magdy S, Abouelseoud Y and Mikhail M (2019). Effect of chosen features on performance of privacy preserving image retrieval systems, Computers and Electrical Engineering, 76:C, (411-424), Online publication date: 1-Jun-2019.
  129. Hiemenz B and Krämer M (2019). Dynamic searchable symmetric encryption for storing geospatial data in the cloud, International Journal of Information Security, 18:3, (333-354), Online publication date: 1-Jun-2019.
  130. Li L, Bayuelo A, Bobadilla L, Alam T and Shell D Coordinated multi-robot planning while preserving individual privacy 2019 International Conference on Robotics and Automation (ICRA), (2188-2194)
  131. Gupta P, Li Y, Mehrotra S, Panwar N, Sharma S and Almanee S (2019). Obscure, Proceedings of the VLDB Endowment, 12:9, (1030-1043), Online publication date: 1-May-2019.
  132. ACM
    Shan Z, Ren K, Blanton M and Wang C (2018). Practical Secure Computation Outsourcing, ACM Computing Surveys, 51:2, (1-40), Online publication date: 31-Mar-2019.
  133. ACM
    Mehrotra S, Sharma S and Ullman J Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, (165-167)
  134. ACM
    Hesamifard E, Takabi H and Ghasemi M Deep Neural Networks Classification over Encrypted Data Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, (97-108)
  135. Chervyakov N, Babenko M, Tchernykh A, Kucherov N, Miranda-López V and Cortés-Mendoza J (2022). AR-RRNS, Future Generation Computer Systems, 92:C, (1080-1092), Online publication date: 1-Mar-2019.
  136. Jin B, Park J and Mun H (2019). A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment, Wireless Personal Communications: An International Journal, 105:2, (599-618), Online publication date: 1-Mar-2019.
  137. ACM
    Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Xiao H, Gao J and Ren K (2019). Privacy-Preserving Truth Discovery in Crowd Sensing Systems, ACM Transactions on Sensor Networks, 15:1, (1-32), Online publication date: 21-Feb-2019.
  138. Limkar S and Jha R (2019). Computing over encrypted spatial data generated by IoT, Telecommunications Systems, 70:2, (193-229), Online publication date: 1-Feb-2019.
  139. ACM
    Zhang Y, Zhao X, Li X, Zhong M, Curtis C and Chen C Enabling Privacy-Preserving Sharing of Genomic Data for GWASs in Decentralized Networks Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, (204-212)
  140. (2019). Scalable keyword-based search and data manipulation on encrypted data, International Journal of Computational Intelligence Studies, 8:1-2, (103-121), Online publication date: 1-Jan-2019.
  141. Kiarie L, Langat P, Muriithi C and Rastegarnia A (2019). Application of Spritz Encryption in Smart Meters to Protect Consumer Data, Journal of Computer Networks and Communications, 2019, Online publication date: 1-Jan-2019.
  142. Alexandru A, Morari M and Pappas G Cloud-Based MPC with Encrypted Data 2018 IEEE Conference on Decision and Control (CDC), (5014-5019)
  143. ACM
    Hunt T, Zhu Z, Xu Y, Peter S and Witchel E (2018). Ryoan, ACM Transactions on Computer Systems, 35:4, (1-32), Online publication date: 16-Dec-2018.
  144. Liu S and Hu B Faster Homomorphic Permutation and Optimizing Bootstrapping in Matrix GSW-FHE Information Security and Cryptology, (607-617)
  145. Jiang L (2018). The identical operands commutative encryption and watermarking based on homomorphism, Multimedia Tools and Applications, 77:23, (30575-30594), Online publication date: 1-Dec-2018.
  146. Azad M, Bag S and Hao F (2022). PrivBox, Future Generation Computer Systems, 89:C, (44-57), Online publication date: 1-Dec-2018.
  147. ACM
    Martins P, Sousa L and Mariano A (2017). A Survey on Fully Homomorphic Encryption, ACM Computing Surveys, 50:6, (1-33), Online publication date: 30-Nov-2018.
  148. ACM
    Viand A and Shafagh H Marble Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, (49-60)
  149. ACM
    Hallman R, Laine K, Dai W, Gama N, Malozemoff A, Polyakov Y and Carpov S Building Applications with Homomorphic Encryption Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (2160-2162)
  150. ACM
    Crockett E, Peikert C and Sharp C ALCHEMY Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1020-1037)
  151. ACM
    Akavia A, Feldman D and Shaul H Secure Search on Encrypted Data via Multi-Ring Sketch Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (985-1001)
  152. Tonyali S, Munoz R, Akkaya K and Ozgur U (2018). A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks, Journal of Network and Computer Applications, 119:C, (24-41), Online publication date: 1-Oct-2018.
  153. Newman M and Shi Y (2018). Limitations on transversal computation through quantum homomorphic encryption, Quantum Information & Computation, 18:11-12, (927-948), Online publication date: 1-Sep-2018.
  154. ACM
    Ugwuoke C, Erkin Z and Lagendijk R Secure Fixed-point Division for Homomorphically Encrypted Operands Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-10)
  155. Demertzis I, Talapatra R and Papamanthou C (2018). Efficient searchable encryption through compression, Proceedings of the VLDB Endowment, 11:11, (1729-1741), Online publication date: 1-Jul-2018.
  156. Bitan D and Dolev S One-Round Secure Multiparty Computation of Arithmetic Streams and Functions Cyber Security Cryptography and Machine Learning, (255-273)
  157. ACM
    Thuraisingham B, Kantarcioglu M, Bertino E, Bakdash J and Fernandez M Towards a Privacy-Aware Quantified Self Data Management Framework Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, (173-184)
  158. Ahmad H, Wang L, Hong H, Li J, Dawood H, Ahmed M and Yang Y (2018). Primitives towards verifiable computation, Frontiers of Computer Science: Selected Publications from Chinese Universities, 12:3, (451-478), Online publication date: 1-Jun-2018.
  159. ACM
    Loyka K, Zhou H and Khatri S A Homomorphic Encryption Scheme Based on Affine Transforms Proceedings of the 2018 on Great Lakes Symposium on VLSI, (51-56)
  160. ACM
    Kim T and Kim H POSTER Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (813-815)
  161. ACM
    Aublin P, Kelbert F, O'Keeffe D, Muthukumaran D, Priebe C, Lind J, Krahn R, Fetzer C, Eyers D and Pietzuch P LibSEAL Proceedings of the Thirteenth EuroSys Conference, (1-15)
  162. Sun W, Zhang R, Lou W and Thomas Hou Y REARGUARD: Secure Keyword Search Using Trusted Hardware IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (801-809)
  163. ACM
    Demertzis I, Papadopoulos S, Papapetrou O, Deligiannakis A, Garofalakis M and Papamanthou C (2018). Practical Private Range Search in Depth, ACM Transactions on Database Systems, 43:1, (1-52), Online publication date: 11-Apr-2018.
  164. Agun D, Shao J, Ji S, Tessaro S and Yang T Privacy and Efficiency Tradeoffs for Multiword Top K Search with Linear Additive Rank Scoring Proceedings of the 2018 World Wide Web Conference, (1725-1734)
  165. Wang Z and Ling C (2018). On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling, IEEE Transactions on Information Theory, 64:2, (738-751), Online publication date: 1-Feb-2018.
  166. Irena F, Murphy D and Parameswaran S Cryptoblaze Proceedings of the 23rd Asia and South Pacific Design Automation Conference, (702-708)
  167. Irena F, Murphy D and Parameswaran S CryptoBlaze: A partially homomorphic processor with multiple instructions and non-deterministic encryption support 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), (702-708)
  168. Wang X, Luo T, Li J and Hu J (2018). A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  169. Luo F, Wang F, Wang K, Li J, Chen K and Anees A (2018). LWR-Based Fully Homomorphic Encryption, Revisited, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  170. Bai S, Yang G, Shi J, Liu G, Min Z and Di Pietro R (2018). Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  171. Poh G, Mohamad M and Chin J (2018). Searchable symmetric encryption over multiple servers, Cryptography and Communications, 10:1, (139-158), Online publication date: 1-Jan-2018.
  172. Song C, Sang J and Sudirman S (2018). A buyer-seller watermarking protocol for digital secondary market, Multimedia Tools and Applications, 77:1, (225-249), Online publication date: 1-Jan-2018.
  173. Bibliography Frontiers of Multimedia Research, (315-377)
  174. Chen K, Cai W, Shea R, Huang C, Liu J, Leung V and Hsu C Cloud gaming Frontiers of Multimedia Research, (287-314)
  175. Hsu C, Hong H, Elgamal T, Nahrstedt K and Venkatasubramanian N Multimedia fog computing Frontiers of Multimedia Research, (255-286)
  176. Ramanathan S, Gilani S and Sebe N Utilizing implicit user cues for multimedia analytics Frontiers of Multimedia Research, (219-251)
  177. Rizoiu M, Lee Y, Mishra S and Xie L Hawkes processes for events in social media Frontiers of Multimedia Research, (191-218)
  178. Singh V Situation recognition using multimodal data Frontiers of Multimedia Research, (159-189)
  179. Cui P Social-sensed multimedia computing Frontiers of Multimedia Research, (137-157)
  180. Jeǵou H Efficient similarity search Frontiers of Multimedia Research, (105-134)
  181. Atrey P, Lathey A and Yakubu A Encrypted domain multimedia content analysis Frontiers of Multimedia Research, (75-104)
  182. Alameda-Pineda X, Ricci E and Sebe N Multimodal analysis of free-standing conversational groups Frontiers of Multimedia Research, (51-74)
  183. Friedland G, Smaragdis P, McDermott J and Raj B Audition for multimedia computing Frontiers of Multimedia Research, (31-50)
  184. Wu Z, Yao T, Fu Y and Jiang Y Deep learning for video classification and captioning Frontiers of Multimedia Research, (3-29)
  185. Preface Frontiers of Multimedia Research, (xi-xv)
  186. ACM
    Polyakov Y, Rohloff K, Sahu G and Vaikuntanathan V (2017). Fast Proxy Re-Encryption for Publish/Subscribe Systems, ACM Transactions on Privacy and Security, 20:4, (1-31), Online publication date: 26-Oct-2017.
  187. Leite A, Weigang L, Fregnani J and de Oliveira I Big data management and processing in the context of the system wide information management 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), (1-8)
  188. ACM
    Sethi K, Chopra A, Bera P and Tripathy B Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud Proceedings of the 10th International Conference on Security of Information and Networks, (194-199)
  189. ACM
    Migliore V, Seguin C, Real M, Lapotre V, Tisserand A, Fontaine C, Gogniat G and Tessier R (2017). A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm, ACM Transactions on Embedded Computing Systems, 16:5s, (1-17), Online publication date: 10-Oct-2017.
  190. ACM
    Poh G, Chin J, Yau W, Choo K and Mohamad M (2017). Searchable Symmetric Encryption, ACM Computing Surveys, 50:3, (1-37), Online publication date: 9-Oct-2017.
  191. Alexandru A, Gatsis K and Pappas G Privacy preserving cloud-based quadratic optimization 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1168-1175)
  192. ACM
    Peisert S, Bishop M and Talbot E A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing Proceedings of the 2017 New Security Paradigms Workshop, (80-89)
  193. Li X, Kumari S, Shen J, Wu F, Chen C and Islam S (2017). Secure Data Access and Sharing Scheme for Cloud Storage, Wireless Personal Communications: An International Journal, 96:4, (5295-5314), Online publication date: 1-Oct-2017.
  194. Sun X, Zhang P, Sookhak M, Yu J and Xie W (2017). Utilizing fully homomorphic encryption to implement secure medical computation in smart cities, Personal and Ubiquitous Computing, 21:5, (831-839), Online publication date: 1-Oct-2017.
  195. ACM
    Savvides S, Stephen J, Ardekani M, Sundaram V and Eugster P Secure data types Proceedings of the 2017 Symposium on Cloud Computing, (479-492)
  196. (2017). NaorYung paradigm with shared randomness and applications, Theoretical Computer Science, 692:C, (90-113), Online publication date: 5-Sep-2017.
  197. Anisimov A and Novokshonov A (2017). Trusted Computing with Addition Machines. I, Cybernetics and Systems Analysis, 53:5, (659-668), Online publication date: 1-Sep-2017.
  198. Gupta D and Biswas G (2017). A Secure Cloud Storage using ECC-Based Homomorphic Encryption, International Journal of Information Security and Privacy, 11:3, (54-62), Online publication date: 1-Jul-2017.
  199. ACM
    Mehnaz S, Bellala G and Bertino E A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, (219-230)
  200. Yamamoto H, Hiraide Y and Ishii H (2017). A quantitative measure of the information leaked from queries to search engines and a scheme to reduce it, The Journal of Supercomputing, 73:6, (2494-2505), Online publication date: 1-Jun-2017.
  201. ACM
    Demertzis I and Papamanthou C Fast Searchable Encryption With Tunable Locality Proceedings of the 2017 ACM International Conference on Management of Data, (1053-1067)
  202. ACM
    Alanwar A, Shoukry Y, Chakraborty S, Martin P, Tabuada P and Srivastava M PrOLoc Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, (41-52)
  203. ACM
    Shi Z, Liu X and Yuan X Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, (51-57)
  204. ACM
    Aono Y, Hayashi T, Trieu Phong L and Wang L Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, (35-42)
  205. Ibtihal M, Driss E and Hassan N (2017). Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment, International Journal of Cloud Applications and Computing, 7:2, (27-40), Online publication date: 1-Apr-2017.
  206. Wang Z, Cheung S and Luo Y (2017). Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence, IEEE Transactions on Information Forensics and Security, 12:4, (980-995), Online publication date: 1-Apr-2017.
  207. Ahmadian M, Plochan F, Roessler Z and Marinescu D (2017). SecureNoSQL, International Journal of Information Management: The Journal for Information Professionals, 37:2, (63-74), Online publication date: 1-Apr-2017.
  208. ACM
    Tang J, Cui Y, Li Q, Ren K, Liu J and Buyya R (2016). Ensuring Security and Privacy Preservation for Cloud Data Services, ACM Computing Surveys, 49:1, (1-39), Online publication date: 31-Mar-2017.
  209. Chongchitmate W and Ostrovsky R Circuit-Private Multi-key FHE Proceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 10175, (241-270)
  210. Canetti R, Poburinnaya O and Venkitasubramaniam M Better Two-Round Adaptive Multi-party Computation Proceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 10175, (396-427)
  211. ACM
    Saleh E, Alsa'deh A, Kayed A and Meinel C (2016). Processing Over Encrypted Data, ACM SIGMOD Record, 45:3, (5-16), Online publication date: 6-Dec-2016.
  212. Zhou T, Yang X, Zhang W and Wu L (2016). Efficient fully homomorphic encryption with circularly secure key switching process, International Journal of High Performance Computing and Networking, 9:5/6, (417-422), Online publication date: 1-Dec-2016.
  213. Jiang H, Li X and Xu Q (2016). An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries, Journal of Medical Systems, 40:12, (1-11), Online publication date: 1-Dec-2016.
  214. Doshi N and Jinwala D (2016). A novel approach for privacy homomorphism using attribute-based encryption, Security and Communication Networks, 9:17, (4451-4467), Online publication date: 25-Nov-2016.
  215. ACM
    Qin Z, Yan J, Ren K, Chen C and Wang C (2016). SecSIFT, ACM Transactions on Multimedia Computing, Communications, and Applications, 12:4s, (1-24), Online publication date: 18-Nov-2016.
  216. Vorugunti C PPMUAS: A privacy preserving mobile user authentication system for cloud environment utilizing big data features 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), (1-6)
  217. Hunt T, Zhu Z, Xu Y, Peter S and Witchel E Ryoan Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (533-549)
  218. Mohanty M, Asghar M and Russello G (2016). $2DCrypt$, IEEE Transactions on Information Forensics and Security, 11:11, (2542-2555), Online publication date: 1-Nov-2016.
  219. Peikert C and Shiehian S Multi-key FHE from LWE, Revisited Proceedings, Part II, of the 14th International Conference on Theory of Cryptography - Volume 9986, (217-238)
  220. Brakerski Z, Cash D, Tsabary R and Wee H Targeted Homomorphic Attribute-Based Encryption Proceedings, Part II, of the 14th International Conference on Theory of Cryptography - Volume 9986, (330-360)
  221. Lindell Y, Smart N and Soria-Vazquez E More Efficient Constant-Round Multi-party Computation from BMR and SHE Proceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 9985, (554-581)
  222. ACM
    Hahn F and Kerschbaum F Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage Proceedings of the 2016 ACM on Cloud Computing Security Workshop, (23-34)
  223. ACM
    Dimitrov V, Kerik L, Krips T, Randmets J and Willemson J Alternative Implementations of Secure Real Numbers Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (553-564)
  224. ACM
    Stephen J, Savvides S, Sundaram V, Ardekani M and Eugster P STYX Proceedings of the Seventh ACM Symposium on Cloud Computing, (348-360)
  225. ACM
    Cheng R, Scott W, Ellenbogen P, Howell J, Roesner F, Krishnamurthy A and Anderson T Radiatus Proceedings of the Seventh ACM Symposium on Cloud Computing, (237-250)
  226. Kiraz M and Uzunkol O (2016). Efficient and verifiable algorithms for secure outsourcing of cryptographic computations, International Journal of Information Security, 15:5, (519-537), Online publication date: 1-Oct-2016.
  227. Carter H, Mood B, Traynor P and Butler K (2016). Outsourcing secure two-party computation as a black box, Security and Communication Networks, 9:14, (2261-2275), Online publication date: 25-Sep-2016.
  228. Green M, Katz J, Malozemoff A and Zhou H A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation Proceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 9841, (587-603)
  229. ACM
    Umadevi C and Gopalan N Fully Homomorphic Symmetric Key Encryption with Smith Normal Form for Privacy Preserving Cloud Processing Proceedings of the International Conference on Informatics and Analytics, (1-5)
  230. Brakerski Z and Perlman R Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts Proceedings, Part I, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9814, (190-213)
  231. Bourse F, Pino R, Minelli M and Wee H FHE Circuit Privacy Almost for Free Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, (62-89)
  232. Alamati N and Peikert C Three's Compromised Too Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, (659-680)
  233. ACM
    Kumar M, Meena J, Vardhan M and Jain S Secure and Efficient Regression Analysis Outsourcing Algorithm for Cloud Server Proceedings of the International Conference on Advances in Information Communication Technology & Computing, (1-6)
  234. ACM
    Dou Y, Zeng K, Li H, Yang Y, Gao B, Guan C, Ren K and Li S P2-SAS Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, (321-330)
  235. ACM
    Demertzis I, Papadopoulos S, Papapetrou O, Deligiannakis A and Garofalakis M Practical Private Range Search Revisited Proceedings of the 2016 International Conference on Management of Data, (185-198)
  236. Zhang L, Zheng Y and Kantoa R A Review of Homomorphic Encryption and its Applications Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, (97-106)
  237. ACM
    Hu X, Zhang W, Li K, Hu H and Yu N (2016). Secure Nonlocal Denoising in Outsourced Images, ACM Transactions on Multimedia Computing, Communications, and Applications, 12:3, (1-23), Online publication date: 15-Jun-2016.
  238. ACM
    Bringer J, El Omri O, Morel C and Chabanne H Boosting GSHADE Capabilities Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, (203-214)
  239. Ducas L and Stehlé D Sanitization of FHE Ciphertexts Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (294-310)
  240. Gong Y, Fang Y and Guo Y (2016). Private data analytics on biomedical sensing data via distributed computation, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 13:3, (431-444), Online publication date: 1-May-2016.
  241. Albrecht M, Faugère J, Farshim P, Herold G and Perret L (2016). Polly Cracker, revisited, Designs, Codes and Cryptography, 79:2, (261-302), Online publication date: 1-May-2016.
  242. ACM
    Garg S, Gentry C, Halevi S, Raykova M, Sahai A and Waters B (2016). Hiding secrets in software, Communications of the ACM, 59:5, (113-120), Online publication date: 26-Apr-2016.
  243. ACM
    Preuveneers D and Joosen W Privacy-enabled remote health monitoring applications for resource constrained wearable devices Proceedings of the 31st Annual ACM Symposium on Applied Computing, (119-124)
  244. Wang F, Mickens J, Zeldovich N and Vaikuntanathan V Sieve Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (611-626)
  245. Cilardo A and Argenziano D Securing the cloud with reconfigurable computing Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1622-1627)
  246. Damgård I, Polychroniadou A and Rao V Adaptively Secure Multi-Party Computation from LWE via Equivocal FHE Proceedings, Part II, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 9615, (208-233)
  247. Cohen R Asynchronous Secure Multiparty Computation in Constant Time Proceedings, Part II, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 9615, (183-207)
  248. Peikert C (2016). A Decade of Lattice Cryptography, Foundations and Trends® in Theoretical Computer Science, 10:4, (283-424), Online publication date: 1-Mar-2016.
  249. Costache A and Smart N Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (325-340)
  250. ACM
    Parno B, Howell J, Gentry C and Raykova M (2016). Pinocchio, Communications of the ACM, 59:2, (103-112), Online publication date: 25-Jan-2016.
  251. Mahmoody M, Mohammed A, Nematihaji S, Pass R and Shelat A Lower Bounds on Assumptions Behind Indistinguishability Obfuscation Proceedings, Part I, of the 13th International Conference on Theory of Cryptography - Volume 9562, (49-66)
  252. ACM
    Saha S, Das R, Datta S and Neogy S A cloud security framework for a data centric WSN application Proceedings of the 17th International Conference on Distributed Computing and Networking, (1-6)
  253. Zhou T, Yang X, Zhang W and Wu L (2016). Efficient fully homomorphic encryption with circularly secure key switching process, International Journal of High Performance Computing and Networking, 9:5-6, (417-422), Online publication date: 1-Jan-2016.
  254. ACM
    Shafagh H (2015). Toward computing over encrypted data in IoT systems, XRDS: Crossroads, The ACM Magazine for Students, 22:2, (48-52), Online publication date: 30-Dec-2016.
  255. ACM
    Shafagh H, Hithnawi A, Droescher A, Duquennoy S and Hu W Talos Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, (197-210)
  256. ACM
    Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Xiao H, Gao J and Ren K Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, (183-196)
  257. Sun X, Li B, Lu X and Fang F CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling Revised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 9589, (361-378)
  258. ACM
    Cassola A, Blass E and Noubir G Authenticating Privately over Public Wi-Fi Hotspots Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1346-1357)
  259. Puzio P, Molva R, Önen M and Loureiro S PerfectDedup Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481, (150-166)
  260. Patsakis C, Kotzanikolaou P and Bouroche M Private Proximity Testing on Steroids Proceedings of the 11th International Workshop on Security and Trust Management - Volume 9331, (172-184)
  261. Dolev S and Li Y Secret Shared Random Access Machine Revised Selected Papers of the First International Workshop on Algorithmic Aspects of Cloud Computing - Volume 9511, (19-34)
  262. ACM
    Baumann A, Peinado M and Hunt G (2015). Shielding Applications from an Untrusted Cloud with Haven, ACM Transactions on Computer Systems, 33:3, (1-26), Online publication date: 11-Sep-2015.
  263. Yasuda M, Shimoyama T, Kogure J, Yokoyama K and Koshiba T (2015). New packing method in somewhat homomorphic encryption and its applications, Security and Communication Networks, 8:13, (2194-2213), Online publication date: 10-Sep-2015.
  264. ACM
    Babenko L and Trepacheva A Cryptanalysis of factoring-based fully homomorphic encryption Proceedings of the 8th International Conference on Security of Information and Networks, (80-83)
  265. Abozaid G, Tisserand A, El-Mahdy A and Wada Y (2015). Towards FHE in Embedded Systems: A Preliminary Codesign Space Exploration of a HW/SW Very Large Multiplier, IEEE Embedded Systems Letters, 7:3, (77-80), Online publication date: 1-Sep-2015.
  266. Wang F, Wang K and Li B LWE-Based FHE with Better Parameters Proceedings of the 10th International Workshop on Advances in Information and Computer Security - Volume 9241, (175-192)
  267. ACM
    Ren J, Qi Y, Dai Y, Wang X and Shi Y (2015). AppSec, ACM SIGPLAN Notices, 50:7, (187-199), Online publication date: 25-Aug-2015.
  268. Çetin G, Doröz Y, Sunar B and Savaş E Depth Optimized Efficient Homomorphic Sorting Proceedings of the 4th International Conference on Progress in Cryptology -- LATINCRYPT 2015 - Volume 9230, (61-80)
  269. Wang M An Improved Analysis of Broadcast Attacks on the GGH Cryptosystem Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503, (146-158)
  270. ACM
    Chien C, Meter R and Kuo S (2015). Fault-Tolerant Operations for Universal Blind Quantum Computation, ACM Journal on Emerging Technologies in Computing Systems, 12:1, (1-26), Online publication date: 3-Aug-2015.
  271. Liang M (2015). Quantum fully homomorphic encryption scheme based on universal quantum circuit, Quantum Information Processing, 14:8, (2749-2759), Online publication date: 1-Aug-2015.
  272. Plantard T, Susilo W and Zhang Z (2015). LLL for ideal lattices, Designs, Codes and Cryptography, 76:2, (325-344), Online publication date: 1-Aug-2015.
  273. ACM
    Huang W, Ganjali A, Kim B, Oh S and Lie D (2015). The State of Public Infrastructure-as-a-Service Cloud Security, ACM Computing Surveys, 47:4, (1-31), Online publication date: 21-Jul-2015.
  274. ACM
    Canetti R, Holmgren J, Jain A and Vaikuntanathan V Succinct Garbling and Indistinguishability Obfuscation for RAM Programs Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (429-437)
  275. ACM
    Guo Z, Han W, Liu L, Xu W, Bu R and Ni M SPA Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, (221-231)
  276. ACM
    Oktay K, Mehrotra S, Khadilkar V and Kantarcioglu M SEMROD Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (153-166)
  277. ACM
    Howe J, Pöppelmann T, O'neill M, O'sullivan E and Güneysu T (2015). Practical Lattice-Based Digital Signature Schemes, ACM Transactions on Embedded Computing Systems, 14:3, (1-24), Online publication date: 21-May-2015.
  278. Zhenhua L, Jinmiao W and Bo L (2015). A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search, Security and Communication Networks, 8:6, (879-887), Online publication date: 1-Apr-2015.
  279. ACM
    Wu D (2015). Fully Homomorphic Encryption: Cryptography's holy grail, XRDS: Crossroads, The ACM Magazine for Students, 21:3, (24-29), Online publication date: 27-Mar-2015.
  280. ACM
    Ren J, Qi Y, Dai Y, Wang X and Shi Y AppSec Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, (187-199)
  281. Konstantinou C, Keliris A and Maniatakos M Privacy-preserving functional IP verification utilizing fully homomorphic encryption Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (333-338)
  282. Wei Wang , Yin Hu , Lianmu Chen , Xinming Huang and Sunar B (2015). Exploring the Feasibility of Fully Homomorphic Encryption, IEEE Transactions on Computers, 64:3, (698-706), Online publication date: 1-Mar-2015.
  283. ACM
    Walfish M and Blumberg A (2015). Verifying computations without reexecuting them, Communications of the ACM, 58:2, (74-84), Online publication date: 28-Jan-2015.
  284. ACM
    Baracaldo N, Androulaki E, Glider J and Sorniotti A Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, (21-32)
  285. ACM
    Sasakawa H, Harada H, duVerle D, Arimura H, Tsuda K and Sakuma J Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome Detection Proceedings of the 13th Workshop on Privacy in the Electronic Society, (21-30)
  286. ACM
    Qin Z, Yan J, Ren K, Chen C and Wang C Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing Proceedings of the 22nd ACM international conference on Multimedia, (497-506)
  287. Doröz Y, Öztürk E and Sunar B (2014). A million-bit multiplier architecture for fully homomorphic encryption, Microprocessors & Microsystems, 38:8, (766-775), Online publication date: 1-Nov-2014.
  288. Baumann A, Peinado M and Hunt G Shielding applications from an untrusted cloud with Haven Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (267-283)
  289. ACM
    Ghafghazi H, El Mougy A, Mouftah H and Adams C Classification of technological privacy techniques for LTE-based public safety networks Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, (41-50)
  290. ACM
    Davison O, Mohammad A and Milios E P-GTM Proceedings of the 2014 ACM symposium on Document engineering, (81-84)
  291. ACM
    Bustos-Jiménez J Do we really need an online informed consent? Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, (629-634)
  292. ACM
    Trepacheva A Cryptanalysis of Polynomial based Homomorphic Encryption Proceedings of the 7th International Conference on Security of Information and Networks, (205-210)
  293. ACM
    Burtyka P and Makarevich O Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations Proceedings of the 7th International Conference on Security of Information and Networks, (186-196)
  294. ACM
    Trepacheva A and Babenko L Known Plaintexts Attack on Polynomial based Homomorphic Encryption Proceedings of the 7th International Conference on Security of Information and Networks, (157-165)
  295. ACM
    Miloslavskaya N, Senatorov M, Tolstoy A and Zapechnikov S Big Data Information Security Maintenance Proceedings of the 7th International Conference on Security of Information and Networks, (89-94)
  296. Sanamrad T, Braun L, Kossmann D and Venkatesan R Randomly Partitioned Encryption for Cloud Databases Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566, (307-323)
  297. ACM
    Brakerski Z, Gentry C and Vaikuntanathan V (2014). (Leveled) Fully Homomorphic Encryption without Bootstrapping, ACM Transactions on Computation Theory, 6:3, (1-36), Online publication date: 1-Jul-2014.
  298. ACM
    Schneider M and Schneider T Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (135-140)
  299. ACM
    Omar R, El-Mahdy A and Rohou E Arbitrary control-flow embedding into multiple threads for obfuscation Proceedings of the 2nd international workshop on Security in cloud computing, (51-58)
  300. Kirshanova E Proxy Re-encryption from Lattices Proceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 8383, (77-94)
  301. Tsoutsos N and Maniatakos M HEROIC Proceedings of the conference on Design, Automation & Test in Europe, (1-6)
  302. ACM
    Brakerski Z and Vaikuntanathan V Lattice-based FHE as secure as PKE Proceedings of the 5th conference on Innovations in theoretical computer science, (1-12)
  303. Alwen J, Barbosa M, Farshim P, Gennaro R, Gordon S, Tessaro S and Wilson D On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308, (65-84)
  304. Damgård I, Jakobsen T, Nielsen J and Pagter J Secure Key Management in the Cloud Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308, (270-289)
  305. ACM
    Biselli A, Franz E and Coutinho M Protection of consumer data in the smart grid compliant with the German smart metering guideline Proceedings of the first ACM workshop on Smart energy grid security, (41-52)
  306. Duan J, Gao D, Foh C and Zhang H (2013). TC-BAC, Ad Hoc Networks, 11:8, (2675-2692), Online publication date: 1-Nov-2013.
  307. Saleh E and Meinel C HPISecure Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (605-609)
  308. ACM
    Setty S, Braun B, Vu V, Blumberg A, Parno B and Walfish M Resolving the conflict between generality and plausibility in verified computation Proceedings of the 8th ACM European Conference on Computer Systems, (71-84)
  309. Myers S, Sergi M and shelat a Black-Box proof of knowledge of plaintext and multiparty computation with low communication overhead Proceedings of the 10th theory of cryptography conference on Theory of Cryptography, (397-417)
  310. ACM
    Tao L, Xiaojun Y and Jianmin W Protecting data confidentiality in cloud systems Proceedings of the Fourth Asia-Pacific Symposium on Internetware, (1-12)
  311. ACM
    Fletcher C, Dijk M and Devadas S Towards an interpreter for efficient encrypted computation Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, (83-94)
  312. Brakerski Z Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (868-886)
  313. Gorbunov S, Vaikuntanathan V and Wee H Functional Encryption with Bounded Collusions via Multi-party Computation Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (162-179)
  314. Armknecht F, Katzenbeisser S and Peter A Shift-type homomorphic encryption and its application to fully homomorphic encryption Proceedings of the 5th international conference on Cryptology in Africa, (234-251)
  315. ACM
    López-Alt A, Tromer E and Vaikuntanathan V On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (1219-1234)
  316. Ruj S, Stojmenovic M and Nayak A Privacy Preserving Access Control with Authentication for Securing Data in Clouds Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), (556-563)
  317. Micciancio D and Peikert C Trapdoors for lattices Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, (700-718)
  318. Gentry C, Halevi S and Smart N Fully homomorphic encryption with polylog overhead Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, (465-482)
  319. Coron J, Naccache D and Tibouchi M Public key compression and modulus switching for fully homomorphic encryption over the integers Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, (446-464)
  320. Zhang Z, Plantard T and Susilo W On the CCA-1 security of somewhat homomorphic encryption over the integers Proceedings of the 8th international conference on Information Security Practice and Experience, (353-368)
  321. Ahn J, Boneh D, Camenisch J, Hohenberger S, shelat a and Waters B Computing on authenticated data Proceedings of the 9th international conference on Theory of Cryptography, (1-20)
  322. ACM
    Boneh D, Segev G and Waters B Targeted malleability Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (350-366)
  323. ACM
    Brakerski Z, Gentry C and Vaikuntanathan V (Leveled) fully homomorphic encryption without bootstrapping Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (309-325)
  324. Groth J Efficient zero-knowledge arguments from two-tiered homomorphic commitments Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (431-448)
  325. Agrawal S, Freeman D and Vaikuntanathan V Functional encryption for inner product predicates from learning with errors Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (21-40)
  326. Albrecht M, Farshim P, Faugère J and Perret L Polly cracker, revisited Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (179-196)
  327. Zhang Z, Plantard T and Susilo W Reaction attack on outsourced computing with fully homomorphic encryption schemes Proceedings of the 14th international conference on Information Security and Cryptology, (419-436)
  328. ACM
    Puttaswamy K, Kruegel C and Zhao B Silverline Proceedings of the 2nd ACM Symposium on Cloud Computing, (1-13)
  329. Coron J, Mandal A, Naccache D and Tibouchi M Fully homomorphic encryption over the integers with shorter public keys Proceedings of the 31st annual conference on Advances in cryptology, (487-504)
  330. Loftus J, May A, Smart N and Vercauteren F On CCA-Secure somewhat homomorphic encryption Proceedings of the 18th international conference on Selected Areas in Cryptography, (55-72)
  331. Mikuš M On implementation of the Gentry-Halevi somewhat homomorphic scheme Proceedings of the 2011 international conference on Computers and computing, (131-134)
  332. Boneh D and Freeman D Homomorphic signatures for polynomial functions Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, (149-168)
  333. Stehlé D and Steinfeld R Making NTRU as secure as worst-case problems over ideal lattices Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, (27-47)
  334. Boneh D, Sahai A and Waters B Functional encryption Proceedings of the 8th conference on Theory of cryptography, (253-273)
  335. Ogura N, Yamamoto G, Kobayashi T and Uchiyama S An improvement of key generation algorithm for Gentry's homomorphic encryption scheme Proceedings of the 5th international conference on Advances in information and computer security, (70-83)
  336. Ding N and Gu D On obfuscating programs with tamper-proof hardware Proceedings of the 6th international conference on Information security and cryptology, (487-502)
  337. Gennaro R, Gentry C and Parno B Non-interactive verifiable computing Proceedings of the 30th annual conference on Advances in cryptology, (465-482)
  338. Melchor C, Gaborit P and Herranz J Additively homomorphic encryption with d-operand multiplications Proceedings of the 30th annual conference on Advances in cryptology, (138-154)
  339. Gentry C Toward basing fully homomorphic encryption on worst-case hardness Proceedings of the 30th annual conference on Advances in cryptology, (116-137)
  340. Lipmaa H and Zhang B Two new efficient PIR-writing protocols Proceedings of the 8th international conference on Applied cryptography and network security, (438-455)
  341. Hada S Secure obfuscation for encrypted signatures Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (92-112)
  342. Gentry C, Halevi S and Vaikuntanathan V A simple BGN-Type cryptosystem from LWE Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (506-522)
  343. van Dijk M, Gentry C, Halevi S and Vaikuntanathan V Fully homomorphic encryption over the integers Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (24-43)
  344. ACM
    Gentry C (2010). Computing arbitrary functions of encrypted data, Communications of the ACM, 53:3, (97-105), Online publication date: 1-Mar-2010.
  345. Doröz Y, Öztürk E, Savaş E and Sunar B Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware Cryptographic Hardware and Embedded Systems -- CHES 2015, (185-204)
  346. Broadbent A and Jeffery S Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity Advances in Cryptology -- CRYPTO 2015, (609-629)
  347. Guo Q, Johansson T and Stankovski P Coded-BKW: Solving LWE Using Lattice Codes Advances in Cryptology -- CRYPTO 2015, (23-42)
Contributors
  • Stanford University
  • IBM Research

Recommendations