BibTeX records: Craig Gentry

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/GentryHL22,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vadim Lyubashevsky},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Practical Non-interactive Publicly Verifiable Secret Sharing with
                  Thousands of Parties},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {458--487},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_16},
  doi          = {10.1007/978-3-031-06944-4\_16},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AkaviaGHV22,
  author       = {Adi Akavia and
                  Craig Gentry and
                  Shai Halevi and
                  Margarita Vald},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Achievable {CCA2} Relaxation for Homomorphic Encryption},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {70--99},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_3},
  doi          = {10.1007/978-3-031-22365-5\_3},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AkaviaGHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaGHV22,
  author       = {Adi Akavia and
                  Craig Gentry and
                  Shai Halevi and
                  Margarita Vald},
  title        = {Achievable {CCA2} Relaxation for Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/282},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaGHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Tal Rabin and
                  Sophia Yakoubov},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral
                  Roles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_3},
  doi          = {10.1007/978-3-030-84245-1\_3},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GentryHMNY21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Sophia Yakoubov},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Random-Index {PIR} and Applications},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_2},
  doi          = {10.1007/978-3-030-90456-2\_2},
  timestamp    = {Mon, 08 Nov 2021 11:51:39 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GentryHMNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHKMNRY21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Tal Rabin and
                  Sophia Yakoubov},
  title        = {{YOSO:} You Only Speak Once / Secure {MPC} with Stateless Ephemeral
                  Roles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/210},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHKMNRY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHL21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vadim Lyubashevsky},
  title        = {Practical Non-interactive Publicly Verifiable Secret Sharing with
                  Thousands of Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1397},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1397},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaG0HK020,
  author       = {Fabrice Benhamouda and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Chengyu Lin and
                  Tal Rabin and
                  Leonid Reyzin},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Can a Public Blockchain Keep a Secret?},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {260--290},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_10},
  doi          = {10.1007/978-3-030-64375-1\_10},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaG0HK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaGGHKL20,
  author       = {Fabrice Benhamouda and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Chengyu Lin and
                  Tal Rabin and
                  Leonid Reyzin},
  title        = {Can a Blockchain Keep a Secret?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaGGHKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHMNY20,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Sophia Yakoubov},
  title        = {Random-index {PIR} with Applications to Large-Scale Secure {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1248},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHMNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AkaviaGHL19,
  author       = {Adi Akavia and
                  Craig Gentry and
                  Shai Halevi and
                  Max Leibovich},
  title        = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing
                  Free},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {3},
  pages        = {87--107},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0038},
  doi          = {10.2478/POPETS-2019-0038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AkaviaGHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GeniseGHLM19,
  author       = {Nicholas Genise and
                  Craig Gentry and
                  Shai Halevi and
                  Baiyu Li and
                  Daniele Micciancio},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Homomorphic Encryption for Finite Automata},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {473--502},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_17},
  doi          = {10.1007/978-3-030-34621-8\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GeniseGHLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GentryH19,
  author       = {Craig Gentry and
                  Shai Halevi},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Compressible {FHE} with Applications to {PIR}},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {438--464},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_17},
  doi          = {10.1007/978-3-030-36033-7\_17},
  timestamp    = {Mon, 25 Nov 2019 13:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GentryH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeniseGHLM19,
  author       = {Nicholas Genise and
                  Craig Gentry and
                  Shai Halevi and
                  Baiyu Li and
                  Daniele Micciancio},
  title        = {Homomorphic Encryption for Finite Automata},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeniseGHLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH19,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Compressible {FHE} with Applications to {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {733},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/733},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CrawfordGHPS18,
  author       = {Jack L. H. Crawford and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Platt and
                  Victor Shoup},
  editor       = {Michael Brenner and
                  Kurt Rohloff},
  title        = {Doing Real Work with {FHE:} The Case of Logistic Regression},
  booktitle    = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October
                  19, 2018},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267973.3267974},
  doi          = {10.1145/3267973.3267974},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CrawfordGHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryOR18,
  author       = {Craig Gentry and
                  Adam O'Neill and
                  Leonid Reyzin},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {34--57},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_2},
  doi          = {10.1007/978-3-319-76581-5\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GentryJ18,
  author       = {Craig Gentry and
                  Charanjit S. Jutla},
  title        = {Obfuscation using Tensor Products},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-149}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/149},
  eprinttype    = {ECCC},
  eprint       = {TR18-149},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GentryJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryOR18,
  author       = {Craig Gentry and
                  Adam O'Neill and
                  Leonid Reyzin},
  title        = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrawfordGHPS18,
  author       = {Jack L. H. Crawford and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Platt and
                  Victor Shoup},
  title        = {Doing Real Work with {FHE:} The Case of Logistic Regression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrawfordGHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryJ18,
  author       = {Craig Gentry and
                  Charanjit S. Jutla},
  title        = {Obfuscation Using Tensor Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaGHL18,
  author       = {Adi Akavia and
                  Craig Gentry and
                  Shai Halevi and
                  Max Leibovich},
  title        = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing
                  Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaGHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/GargGHW17,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Wichs},
  title        = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
                  Witness Encryption with Auxiliary Input},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1353--1373},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-017-0276-6},
  doi          = {10.1007/S00453-017-0276-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/GargGHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenGH17,
  author       = {Yilei Chen and
                  Craig Gentry and
                  Shai Halevi},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Cryptanalyses of Candidate Branching Program Obfuscators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {278--307},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_10},
  doi          = {10.1007/978-3-319-56617-7\_10},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ParnoHG016,
  author       = {Bryan Parno and
                  Jon Howell and
                  Craig Gentry and
                  Mariana Raykova},
  title        = {Pinocchio: nearly practical verifiable computation},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {2},
  pages        = {103--112},
  year         = {2016},
  url          = {https://doi.org/10.1145/2856449},
  doi          = {10.1145/2856449},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/ParnoHG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GargGH0SW16,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Hiding secrets in software: a cryptographic approach to program obfuscation},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {5},
  pages        = {113--120},
  year         = {2016},
  url          = {https://doi.org/10.1145/2902313},
  doi          = {10.1145/2902313},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/GargGH0SW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GargGH0SW16,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Candidate Indistinguishability Obfuscation and Functional Encryption
                  for All Circuits},
  journal      = {{SIAM} J. Comput.},
  volume       = {45},
  number       = {3},
  pages        = {882--929},
  year         = {2016},
  url          = {https://doi.org/10.1137/14095772X},
  doi          = {10.1137/14095772X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GargGH0SW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargGHZ16,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mark Zhandry},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Functional Encryption Without Obfuscation},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {480--511},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_18},
  doi          = {10.1007/978-3-662-49099-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargGHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGH16,
  author       = {Yilei Chen and
                  Craig Gentry and
                  Shai Halevi},
  title        = {Cryptanalyses of Candidate Branching Program Obfuscators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {998},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/998},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GentryGIPSS15,
  author       = {Craig Gentry and
                  Jens Groth and
                  Yuval Ishai and
                  Chris Peikert and
                  Amit Sahai and
                  Adam D. Smith},
  title        = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative
                  Zero-Knowledge Proofs},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {4},
  pages        = {820--843},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9184-y},
  doi          = {10.1007/S00145-014-9184-Y},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GentryHJ015,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Charanjit S. Jutla and
                  Mariana Raykova},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Private Database Access with HE-over-ORAM Architecture},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {172--191},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_9},
  doi          = {10.1007/978-3-319-28166-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GentryHJ015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_12},
  doi          = {10.1007/978-3-662-47989-6\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryLSW15,
  author       = {Craig Gentry and
                  Allison Bishop Lewko and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Venkatesan Guruswami},
  title        = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
                  Assumption},
  booktitle    = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2015, Berkeley, CA, USA, 17-20 October, 2015},
  pages        = {151--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FOCS.2015.19},
  doi          = {10.1109/FOCS.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GentryLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GentryGH15,
  author       = {Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Graph-Induced Multilinear Maps from Lattices},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {498--527},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_20},
  doi          = {10.1007/978-3-662-46497-7\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GentryGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGHLST15,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toct/BrakerskiGV14,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Vinod Vaikuntanathan},
  title        = {(Leveled) Fully Homomorphic Encryption without Bootstrapping},
  journal      = {{ACM} Trans. Comput. Theory},
  volume       = {6},
  number       = {3},
  pages        = {13:1--13:36},
  year         = {2014},
  url          = {https://doi.org/10.1145/2633600},
  doi          = {10.1145/2633600},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toct/BrakerskiGV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/Gentry14,
  author       = {Craig Gentry},
  title        = {Noncommutative Determinant is Hard: {A} Simple Proof Using an Extension
                  of Barrington's Theorem},
  booktitle    = {{IEEE} 29th Conference on Computational Complexity, {CCC} 2014, Vancouver,
                  BC, Canada, June 11-13, 2014},
  pages        = {181--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CCC.2014.26},
  doi          = {10.1109/CCC.2014.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/Gentry14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryLW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Brent Waters},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Witness Encryption from Instance Independent Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {426--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_24},
  doi          = {10.1007/978-3-662-44371-2\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargGHW14,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Wichs},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
                  Witness Encryption with Auxiliary Input},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {518--535},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_29},
  doi          = {10.1007/978-3-662-44371-2\_29},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargGHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryHLO0W14,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Steve Lu and
                  Rafail Ostrovsky and
                  Mariana Raykova and
                  Daniel Wichs},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Garbled {RAM} Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {405--422},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_23},
  doi          = {10.1007/978-3-642-55220-5\_23},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryHLO0W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGGHNSVV14,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Valeria Nikolaenko and
                  Gil Segev and
                  Vinod Vaikuntanathan and
                  Dhinakaran Vinayagamurthy},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Fully Key-Homomorphic Encryption, Arithmetic Circuit {ABE} and Compact
                  Garbled Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {533--556},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_30},
  doi          = {10.1007/978-3-642-55220-5\_30},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehGGHNSVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryH0W14,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Daniel Wichs},
  title        = {Outsourcing Private {RAM} Computation},
  booktitle    = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2014, Philadelphia, PA, USA, October 18-21, 2014},
  pages        = {404--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FOCS.2014.50},
  doi          = {10.1109/FOCS.2014.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GentryH0W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargGH014,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova},
  editor       = {Yehuda Lindell},
  title        = {Two-Round Secure {MPC} from Indistinguishability Obfuscation},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {74--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_4},
  doi          = {10.1007/978-3-642-54242-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargGH014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Gentry14,
  author       = {Craig Gentry},
  title        = {Noncommutative Determinant is Hard: {A} Simple Proof Using an Extension
                  of Barrington's Theorem},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-105}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/105},
  eprinttype    = {ECCC},
  eprint       = {TR14-105},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Gentry14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Gentry14a,
  author       = {Craig Gentry},
  title        = {Computing on the edge of chaos: Structure and randomness in encrypted
                  computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-106}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/106},
  eprinttype    = {ECCC},
  eprint       = {TR14-106},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/Gentry14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH0W14,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Daniel Wichs},
  title        = {Garbled {RAM} Revisited, Part {I}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH0W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH0W14a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Daniel Wichs},
  title        = {Outsourcing Private {RAM} Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH0W14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryLW14,
  author       = {Craig Gentry and
                  Allison Bishop Lewko and
                  Brent Waters},
  title        = {Witness Encryption from Instance Independent Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryLSW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHJ014,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Charanjit S. Jutla and
                  Mariana Raykova},
  title        = {Private Database Access With HE-over-ORAM Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHJ014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGHNSVV14,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Valeria Nikolaenko and
                  Gil Segev and
                  Vinod Vaikuntanathan and
                  Dhinakaran Vinayagamurthy},
  title        = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact
                  Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGGHNSVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gentry14,
  author       = {Craig Gentry},
  title        = {Computing on the Edge of Chaos: Structure and Randomness in Encrypted
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gentry14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGHZ14,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mark Zhandry},
  title        = {Fully Secure Attribute Based Encryption from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/622},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryGH14a,
  author       = {Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi},
  title        = {Graph-Induced Multilinear Maps from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryGH14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGHZ14b,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mark Zhandry},
  title        = {Fully Secure Functional Encryption without Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {666},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGHZ14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHMS14,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Hemanta K. Maji and
                  Amit Sahai},
  title        = {Zeroizing without zeroes: Cryptanalyzing multilinear maps without
                  encodings of zero},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/929},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GentryHPS13,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Chris Peikert and
                  Nigel P. Smart},
  title        = {Field switching in BGV-style homomorphic encryption},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {663--684},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130480},
  doi          = {10.3233/JCS-130480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GentryHPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BonehGHWW13,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Shai Halevi and
                  Frank Wang and
                  David J. Wu},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Private Database Queries Using Somewhat Homomorphic Encryption},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_7},
  doi          = {10.1007/978-3-642-38980-1\_7},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BonehGHWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalGHS13,
  author       = {Shweta Agrawal and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Discrete Gaussian Leftover Hash Lemma over Infinite Domains},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_6},
  doi          = {10.1007/978-3-642-42033-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalGHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentrySW13,
  author       = {Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler,
                  Asymptotically-Faster, Attribute-Based},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_5},
  doi          = {10.1007/978-3-642-40041-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentrySW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargGHSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {479--499},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_27},
  doi          = {10.1007/978-3-642-40084-1\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargGH13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Candidate Multilinear Maps from Ideal Lattices},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_1},
  doi          = {10.1007/978-3-642-38348-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GennaroGP013,
  author       = {Rosario Gennaro and
                  Craig Gentry and
                  Bryan Parno and
                  Mariana Raykova},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Quadratic Span Programs and Succinct NIZKs without PCPs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {626--645},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_37},
  doi          = {10.1007/978-3-642-38348-9\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GennaroGP013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GargGH0SW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Candidate Indistinguishability Obfuscation and Functional Encryption
                  for all Circuits},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.13},
  doi          = {10.1109/FOCS.2013.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GargGH0SW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/GentryGHJ0W13,
  author       = {Craig Gentry and
                  Kenny A. Goldman and
                  Shai Halevi and
                  Charanjit S. Jutla and
                  Mariana Raykova and
                  Daniel Wichs},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {Optimizing {ORAM} and Using It Efficiently for Secure Computation},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_1},
  doi          = {10.1007/978-3-642-39077-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/GentryGHJ0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrakerskiGH13,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Packed Ciphertexts in LWE-Based Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_1},
  doi          = {10.1007/978-3-642-36362-7\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrakerskiGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ParnoHG013,
  author       = {Bryan Parno and
                  Jon Howell and
                  Craig Gentry and
                  Mariana Raykova},
  title        = {Pinocchio: Nearly Practical Verifiable Computation},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {238--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.47},
  doi          = {10.1109/SP.2013.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ParnoHG013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GargGSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Witness encryption and its applications},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {467--476},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488667},
  doi          = {10.1145/2488608.2488667},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/GargGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Gentry13,
  author       = {Craig Gentry},
  editor       = {Amit Sahai},
  title        = {Encrypted Messages from the Heights of Cryptomania},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {120--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_7},
  doi          = {10.1007/978-3-642-36594-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Gentry13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGHSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/128},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryGHJ0W13,
  author       = {Craig Gentry and
                  Kenny A. Goldman and
                  Shai Halevi and
                  Charanjit S. Jutla and
                  Mariana Raykova and
                  Daniel Wichs},
  title        = {Optimizing {ORAM} and Using it Efficiently for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryGHJ0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  title        = {Witness Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParnoGH013,
  author       = {Bryan Parno and
                  Craig Gentry and
                  Jon Howell and
                  Mariana Raykova},
  title        = {Pinocchio: Nearly Practical Verifiable Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParnoGH013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentrySW13,
  author       = {Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  title        = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler,
                  Asymptotically-Faster, Attribute-Based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentrySW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGHWW13,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Shai Halevi and
                  Frank Wang and
                  David J. Wu},
  title        = {Private Database Queries Using Somewhat Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/422},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGHWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH0SW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Candidate Indistinguishability Obfuscation and Functional Encryption
                  for all circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/451},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH0SW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH013,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova},
  title        = {Two-round secure {MPC} from Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/601},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryGHVV13,
  author       = {Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Vinod Vaikuntanathan and
                  Dhinakaran Vinayagamurthy},
  title        = {How to Compress (Reusable) Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryGHVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGHW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Wichs},
  title        = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
                  Witness Encryption with Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/860},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Homomorphic Evaluation of the {AES} Circuit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {850--867},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_49},
  doi          = {10.1007/978-3-642-32009-5\_49},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Fully Homomorphic Encryption with Polylog Overhead},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_28},
  doi          = {10.1007/978-3-642-29011-4\_28},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BrakerskiGV12,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Vinod Vaikuntanathan},
  editor       = {Shafi Goldwasser},
  title        = {(Leveled) fully homomorphic encryption without bootstrapping},
  booktitle    = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA,
                  January 8-10, 2012},
  pages        = {309--325},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2090236.2090262},
  doi          = {10.1145/2090236.2090262},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BrakerskiGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Better Bootstrapping in Fully Homomorphic Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_1},
  doi          = {10.1007/978-3-642-30057-8\_1},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GentryHPS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Chris Peikert and
                  Nigel P. Smart},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Ring Switching in BGV-Style Homomorphic Encryption},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_2},
  doi          = {10.1007/978-3-642-32928-9\_2},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GentryHPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Homomorphic Evaluation of the {AES} Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroGPR12,
  author       = {Rosario Gennaro and
                  Craig Gentry and
                  Bryan Parno and
                  Mariana Raykova},
  title        = {Quadratic Span Programs and Succinct NIZKs without PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroGPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS12a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Ring Switching in BGV-Style Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGH12,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi},
  title        = {Packed Ciphertexts in LWE-based Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH12,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi},
  title        = {Candidate Multilinear Maps from Ideal Lattices and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/610},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGHS12,
  author       = {Shweta Agrawal and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai},
  title        = {Sampling Discrete Gaussians Efficiently and Obliviously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryH11,
  author       = {Craig Gentry and
                  Shai Halevi},
  editor       = {Kenneth G. Paterson},
  title        = {Implementing Gentry's Fully-Homomorphic Encryption Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_9},
  doi          = {10.1007/978-3-642-20465-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryH11,
  author       = {Craig Gentry and
                  Shai Halevi},
  editor       = {Rafail Ostrovsky},
  title        = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic
                  Circuits},
  booktitle    = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
                  2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages        = {107--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FOCS.2011.94},
  doi          = {10.1109/FOCS.2011.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GentryH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GentryW11,
  author       = {Craig Gentry and
                  Daniel Wichs},
  editor       = {Lance Fortnow and
                  Salil P. Vadhan},
  title        = {Separating succinct non-interactive arguments from all falsifiable
                  assumptions},
  booktitle    = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
                  2011, San Jose, CA, USA, 6-8 June 2011},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993636.1993651},
  doi          = {10.1145/1993636.1993651},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GentryW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BrakerskiGV11,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Vinod Vaikuntanathan},
  title        = {Fully Homomorphic Encryption without Bootstrapping},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR11-111}},
  year         = {2011},
  url          = {https://eccc.weizmann.ac.il/report/2011/111},
  eprinttype    = {ECCC},
  eprint       = {TR11-111},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BrakerskiGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGV11,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Vinod Vaikuntanathan},
  title        = {Fully Homomorphic Encryption without Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH11,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS11,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Fully Homomorphic Encryption with Polylog Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS11a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Better Bootstrapping in Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Gentry10,
  author       = {Craig Gentry},
  title        = {Computing arbitrary functions of encrypted data},
  journal      = {Commun. {ACM}},
  volume       = {53},
  number       = {3},
  pages        = {97--105},
  year         = {2010},
  url          = {https://doi.org/10.1145/1666420.1666444},
  doi          = {10.1145/1666420.1666444},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Gentry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gentry10,
  author       = {Craig Gentry},
  editor       = {Tal Rabin},
  title        = {Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {116--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_7},
  doi          = {10.1007/978-3-642-14623-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gentry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHV10,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  editor       = {Tal Rabin},
  title        = {\emph{i}-Hop Homomorphic Encryption and Rerandomizable Yao Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_9},
  doi          = {10.1007/978-3-642-14623-7\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroGP10,
  author       = {Rosario Gennaro and
                  Craig Gentry and
                  Bryan Parno},
  editor       = {Tal Rabin},
  title        = {Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted
                  Workers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_25},
  doi          = {10.1007/978-3-642-14623-7\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DijkGHV10,
  author       = {Marten van Dijk and
                  Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  editor       = {Henri Gilbert},
  title        = {Fully Homomorphic Encryption over the Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {24--43},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_2},
  doi          = {10.1007/978-3-642-13190-5\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DijkGHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryHV10,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  editor       = {Henri Gilbert},
  title        = {A Simple BGN-Type Cryptosystem from {LWE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {506--522},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_26},
  doi          = {10.1007/978-3-642-13190-5\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Gentry10,
  author       = {Craig Gentry},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The Geometry of Provable Security: Some Proofs of Security in Which
                  Lattices Make a Surprise Appearance},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {391--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_12},
  doi          = {10.1007/978-3-642-02295-1\_12},
  timestamp    = {Tue, 16 May 2017 14:24:21 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Gentry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHV10,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  title        = {i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHV10a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  title        = {A Simple BGN-type Cryptosystem from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH10,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Implementing Gentry's Fully-Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryW10,
  author       = {Craig Gentry and
                  Daniel Wichs},
  title        = {Separating Succinct Non-Interactive Arguments From All Falsifiable
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Gentry09,
  author       = {Craig Gentry},
  title        = {A fully homomorphic encryption scheme},
  school       = {Stanford University, {USA}},
  year         = {2009},
  url          = {https://searchworks.stanford.edu/view/8493082},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Gentry09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Gentry09,
  author       = {Craig Gentry},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Computing on Encrypted Data},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {477},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_32},
  doi          = {10.1007/978-3-642-10433-6\_32},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Gentry09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtGHK09,
  author       = {Martin R. Albrecht and
                  Craig Gentry and
                  Shai Halevi and
                  Jonathan Katz},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Attacking cryptographic schemes based on "perturbation polynomials"},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653664},
  doi          = {10.1145/1653662.1653664},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlbrechtGHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryW09,
  author       = {Craig Gentry and
                  Brent Waters},
  editor       = {Antoine Joux},
  title        = {Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_10},
  doi          = {10.1007/978-3-642-01001-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Gentry09,
  author       = {Craig Gentry},
  editor       = {Michael Mitzenmacher},
  title        = {Fully homomorphic encryption using ideal lattices},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536440},
  doi          = {10.1145/1536414.1536440},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Gentry09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GentryH09,
  author       = {Craig Gentry and
                  Shai Halevi},
  editor       = {Omer Reingold},
  title        = {Hierarchical Identity Based Encryption with Polynomially Many Levels},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_26},
  doi          = {10.1007/978-3-642-00457-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GentryH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGHK09,
  author       = {Martin R. Albrecht and
                  Craig Gentry and
                  Shai Halevi and
                  Jonathan Katz},
  title        = {Attacking Cryptographic Schemes Based on "Perturbation Polynomials"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtGHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroGP09,
  author       = {Rosario Gennaro and
                  Craig Gentry and
                  Bryan Parno},
  title        = {Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted
                  Workers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkGHV09,
  author       = {Marten van Dijk and
                  Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  title        = {Fully Homomorphic Encryption over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkGHV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BoldyrevaGOY08,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {New Multiparty Signature Schemes for Network Routing Applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {3:1--3:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410237},
  doi          = {10.1145/1410234.1410237},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GentryPV08,
  author       = {Craig Gentry and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Cynthia Dwork},
  title        = {Trapdoors for hard lattices and new cryptographic constructions},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {197--206},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374407},
  doi          = {10.1145/1374376.1374407},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GentryPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryW08,
  author       = {Craig Gentry and
                  Brent Waters},
  title        = {Adaptive Security in Broadcast Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH08,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Hierarchical Identity Based Encryption with Polynomially Many Levels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaGOY07,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Ordered multisignatures and identity-based sequential aggregate signatures,
                  with applications to secure routing},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {276--285},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315280},
  doi          = {10.1145/1315245.1315280},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoldyrevaGOY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BonehGH07,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Michael Hamburg},
  title        = {Space-Efficient Identity Based Encryption Without Pairings},
  booktitle    = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages        = {647--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FOCS.2007.64},
  doi          = {10.1109/FOCS.2007.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BonehGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GentryPV07,
  author       = {Craig Gentry and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  title        = {Trapdoors for Hard Lattices and New Cryptographic Constructions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR07-133}},
  year         = {2007},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-133/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR07-133},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GentryPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGH07,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Michael Hamburg},
  title        = {Space-Efficient Identity Based Encryption Without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryPV07,
  author       = {Craig Gentry and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  title        = {Trapdoors for Hard Lattices and New Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaGOY07,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures,
                  with Applications to Secure Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaGOY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryMR06,
  author       = {Craig Gentry and
                  Philip D. MacKenzie and
                  Zulfikar Ramzan},
  editor       = {Cynthia Dwork},
  title        = {A Method for Making Password-Based Key Exchange Resilient to Server
                  Compromise},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {142--159},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_9},
  doi          = {10.1007/11818175\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Gentry06,
  author       = {Craig Gentry},
  editor       = {Serge Vaudenay},
  title        = {Practical Identity-Based Encryption Without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {445--464},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_27},
  doi          = {10.1007/11761679\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Gentry06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryRW06,
  author       = {Craig Gentry and
                  Zulfikar Ramzan and
                  David P. Woodruff},
  title        = {Explicit Exclusive Set Systems with Applications to Broadcast Encryption},
  booktitle    = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages        = {27--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FOCS.2006.27},
  doi          = {10.1109/FOCS.2006.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GentryRW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KempfWRG06,
  author       = {James Kempf and
                  Jonathan Wood and
                  Zulfikar Ramzan and
                  Craig Gentry},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {{IP} Address Authorization for Secure Address Proxying Using Multi-key
                  CGAs and Ring Signatures},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_14},
  doi          = {10.1007/11908739\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KempfWRG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryR06,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Identity-Based Aggregate Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {257--273},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_17},
  doi          = {10.1007/11745853\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GentryRS06,
  author       = {Craig Gentry and
                  Zulfikar Ramzan and
                  Stuart G. Stubblebine},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Distributed Human Computation},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {177--180},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_24},
  doi          = {10.1007/978-3-642-04904-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GentryRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gentry06,
  author       = {Craig Gentry},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Distributed Human Computation},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {181--189},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_25},
  doi          = {10.1007/978-3-642-04904-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gentry06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GentryHJKR05,
  author       = {Craig Gentry and
                  Alejandro Hevia and
                  Ravi Jain and
                  Toshiro Kawahara and
                  Zulfikar Ramzan},
  title        = {End-to-end security in the presence of intelligent data adapting proxies:
                  the case of authenticating transcoded streaming media},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {23},
  number       = {2},
  pages        = {464--473},
  year         = {2005},
  url          = {https://doi.org/10.1109/JSAC.2004.839391},
  doi          = {10.1109/JSAC.2004.839391},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GentryHJKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GentryMR05,
  author       = {Craig Gentry and
                  David Molnar and
                  Zulfikar Ramzan},
  editor       = {Bimal K. Roy},
  title        = {Efficient Designated Confirmer Signatures Without Random Oracles or
                  General Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {662--681},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_36},
  doi          = {10.1007/11593447\_36},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GentryMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GentryMR05,
  author       = {Craig Gentry and
                  Philip D. MacKenzie and
                  Zulfikar Ramzan},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Password authenticated key exchange using hidden smooth subgroups},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {299--309},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102160},
  doi          = {10.1145/1102120.1102160},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GentryMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehGW05,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Brent Waters},
  editor       = {Victor Shoup},
  title        = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and
                  Private Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {258--275},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_16},
  doi          = {10.1007/11535218\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GentryRS05,
  author       = {Craig Gentry and
                  Zulfikar Ramzan and
                  Stuart G. Stubblebine},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Secure Distributed \emph{Human} Computation},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {328--332},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_28},
  doi          = {10.1007/11507840\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GentryRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GentryR05,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Single-Database Private Information Retrieval with Constant Communication
                  Rate},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {803--815},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_65},
  doi          = {10.1007/11523468\_65},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/GentryR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/GentryRS05,
  author       = {Craig Gentry and
                  Zulfikar Ramzan and
                  Stuart G. Stubblebine},
  editor       = {John Riedl and
                  Michael J. Kearns and
                  Michael K. Reiter},
  title        = {Secure distributed human computation},
  booktitle    = {Proceedings 6th {ACM} Conference on Electronic Commerce (EC-2005),
                  Vancouver, BC, Canada, June 5-8, 2005},
  pages        = {155--164},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1064009.1064026},
  doi          = {10.1145/1064009.1064026},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/GentryRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGW05,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Brent Waters},
  title        = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and
                  Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GentryR04,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  title        = {Provable Cryptographic Security and its Applications to Mobile Wireless
                  Computing},
  journal      = {Wirel. Pers. Commun.},
  volume       = {29},
  number       = {3-4},
  pages        = {191--203},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:WIRE.0000047062.69722.82},
  doi          = {10.1023/B:WIRE.0000047062.69722.82},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GentryR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GentryR04,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Pil Joong Lee},
  title        = {Eliminating Random Permutation Oracles in the Even-Mansour Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_3},
  doi          = {10.1007/978-3-540-30539-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GentryR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/SuzukiRFGNJ04,
  author       = {Takashi Suzuki and
                  Zulfikar Ramzan and
                  Hiroshi Fujimoto and
                  Craig Gentry and
                  Takehiro Nakayama and
                  Ravi Jain},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {A System for End-to-End Authentication of Adaptive Multimedia Content},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {237--249},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_18},
  doi          = {10.1007/0-387-24486-7\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/SuzukiRFGNJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gentry04,
  author       = {Craig Gentry},
  editor       = {Matthew K. Franklin},
  title        = {How to Compress Rabin Ciphertexts and Signatures (and More)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {179--200},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_11},
  doi          = {10.1007/978-3-540-28628-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gentry04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GentryR04,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Ari Juels},
  title        = {Microcredits for Verifiable Foreign Service Provider Metering},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {9--23},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_3},
  doi          = {10.1007/978-3-540-27809-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GentryR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GentryR04,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {{RSA} Accumulator Based Broadcast Encryption},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_7},
  doi          = {10.1007/978-3-540-30144-8\_7},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/GentryR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ElwaillyGR04,
  author       = {Farid F. Elwailly and
                  Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {QuasiModo: Efficient Certificate Validation and Revocation},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {375--388},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_27},
  doi          = {10.1007/978-3-540-24632-9\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ElwaillyGR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Gentry03,
  author       = {Craig Gentry},
  editor       = {Eli Biham},
  title        = {Certificate-Based Encryption and the Certificate Revocation Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {272--293},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_17},
  doi          = {10.1007/3-540-39200-9\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Gentry03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGLS03,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Ben Lynn and
                  Hovav Shacham},
  editor       = {Eli Biham},
  title        = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {416--432},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_26},
  doi          = {10.1007/3-540-39200-9\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehGLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gentry03,
  author       = {Craig Gentry},
  title        = {Certificate-Based Encryption and the Certificate Revocation Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gentry03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GentryS02,
  author       = {Craig Gentry and
                  Alice Silverberg},
  editor       = {Yuliang Zheng},
  title        = {Hierarchical ID-Based Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {548--566},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_34},
  doi          = {10.1007/3-540-36178-2\_34},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GentryS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryS02,
  author       = {Craig Gentry and
                  Michael Szydlo},
  editor       = {Lars R. Knudsen},
  title        = {Cryptanalysis of the Revised {NTRU} Signature Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {299--320},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_20},
  doi          = {10.1007/3-540-46035-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryS02,
  author       = {Craig Gentry and
                  Alice Silverberg},
  title        = {Hierarchical ID-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGLS02,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Ben Lynn and
                  Hovav Shacham},
  title        = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GentryJSS01,
  author       = {Craig Gentry and
                  Jakob Jonsson and
                  Jacques Stern and
                  Michael Szydlo},
  editor       = {Colin Boyd},
  title        = {Cryptanalysis of the {NTRU} Signature Scheme {(NSS)} from Eurocrypt
                  2001},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_1},
  doi          = {10.1007/3-540-45682-1\_1},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GentryJSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Gentry01,
  author       = {Craig Gentry},
  editor       = {Birgit Pfitzmann},
  title        = {Key Recovery and Message Attacks on NTRU-Composite},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_12},
  doi          = {10.1007/3-540-44987-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Gentry01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics