Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Craig Gentry
@inproceedings{DBLP:conf/eurocrypt/GentryHL22, author = {Craig Gentry and Shai Halevi and Vadim Lyubashevsky}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {458--487}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_16}, doi = {10.1007/978-3-031-06944-4\_16}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AkaviaGHV22, author = {Adi Akavia and Craig Gentry and Shai Halevi and Margarita Vald}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Achievable {CCA2} Relaxation for Homomorphic Encryption}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {70--99}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_3}, doi = {10.1007/978-3-031-22365-5\_3}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AkaviaGHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaGHV22, author = {Adi Akavia and Craig Gentry and Shai Halevi and Margarita Vald}, title = {Achievable {CCA2} Relaxation for Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2022}, url = {https://eprint.iacr.org/2022/282}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaGHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21, author = {Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov}, editor = {Tal Malkin and Chris Peikert}, title = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral Roles}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {64--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_3}, doi = {10.1007/978-3-030-84245-1\_3}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GentryHMNY21, author = {Craig Gentry and Shai Halevi and Bernardo Magri and Jesper Buus Nielsen and Sophia Yakoubov}, editor = {Kobbi Nissim and Brent Waters}, title = {Random-Index {PIR} and Applications}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {32--61}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_2}, doi = {10.1007/978-3-030-90456-2\_2}, timestamp = {Mon, 08 Nov 2021 11:51:39 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GentryHMNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHKMNRY21, author = {Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov}, title = {{YOSO:} You Only Speak Once / Secure {MPC} with Stateless Ephemeral Roles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2021}, url = {https://eprint.iacr.org/2021/210}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHKMNRY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHL21, author = {Craig Gentry and Shai Halevi and Vadim Lyubashevsky}, title = {Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1397}, year = {2021}, url = {https://eprint.iacr.org/2021/1397}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GentryHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaG0HK020, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Can a Public Blockchain Keep a Secret?}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {260--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_10}, doi = {10.1007/978-3-030-64375-1\_10}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaG0HK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaGGHKL20, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, title = {Can a Blockchain Keep a Secret?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2020}, url = {https://eprint.iacr.org/2020/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaGGHKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHMNY20, author = {Craig Gentry and Shai Halevi and Bernardo Magri and Jesper Buus Nielsen and Sophia Yakoubov}, title = {Random-index {PIR} with Applications to Large-Scale Secure {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2020}, url = {https://eprint.iacr.org/2020/1248}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GentryHMNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AkaviaGHL19, author = {Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich}, title = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {3}, pages = {87--107}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0038}, doi = {10.2478/POPETS-2019-0038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AkaviaGHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GeniseGHLM19, author = {Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Homomorphic Encryption for Finite Automata}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {473--502}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_17}, doi = {10.1007/978-3-030-34621-8\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GeniseGHLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GentryH19, author = {Craig Gentry and Shai Halevi}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Compressible {FHE} with Applications to {PIR}}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {438--464}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_17}, doi = {10.1007/978-3-030-36033-7\_17}, timestamp = {Mon, 25 Nov 2019 13:59:31 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GentryH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeniseGHLM19, author = {Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio}, title = {Homomorphic Encryption for Finite Automata}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2019}, url = {https://eprint.iacr.org/2019/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeniseGHLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH19, author = {Craig Gentry and Shai Halevi}, title = {Compressible {FHE} with Applications to {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {733}, year = {2019}, url = {https://eprint.iacr.org/2019/733}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrawfordGHPS18, author = {Jack L. H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup}, editor = {Michael Brenner and Kurt Rohloff}, title = {Doing Real Work with {FHE:} The Case of Logistic Regression}, booktitle = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {1--12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267973.3267974}, doi = {10.1145/3267973.3267974}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CrawfordGHPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryOR18, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, editor = {Michel Abdalla and Ricardo Dahab}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {34--57}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_2}, doi = {10.1007/978-3-319-76581-5\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GentryOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GentryJ18, author = {Craig Gentry and Charanjit S. Jutla}, title = {Obfuscation using Tensor Products}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-149}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/149}, eprinttype = {ECCC}, eprint = {TR18-149}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GentryJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryOR18, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2018}, url = {http://eprint.iacr.org/2018/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrawfordGHPS18, author = {Jack L. H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup}, title = {Doing Real Work with {FHE:} The Case of Logistic Regression}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2018}, url = {http://eprint.iacr.org/2018/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrawfordGHPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryJ18, author = {Craig Gentry and Charanjit S. Jutla}, title = {Obfuscation Using Tensor Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2018}, url = {https://eprint.iacr.org/2018/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaGHL18, author = {Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich}, title = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1235}, year = {2018}, url = {https://eprint.iacr.org/2018/1235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaGHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/GargGHW17, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs}, title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1353--1373}, year = {2017}, url = {https://doi.org/10.1007/s00453-017-0276-6}, doi = {10.1007/S00453-017-0276-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/GargGHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenGH17, author = {Yilei Chen and Craig Gentry and Shai Halevi}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Cryptanalyses of Candidate Branching Program Obfuscators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {278--307}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_10}, doi = {10.1007/978-3-319-56617-7\_10}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ParnoHG016, author = {Bryan Parno and Jon Howell and Craig Gentry and Mariana Raykova}, title = {Pinocchio: nearly practical verifiable computation}, journal = {Commun. {ACM}}, volume = {59}, number = {2}, pages = {103--112}, year = {2016}, url = {https://doi.org/10.1145/2856449}, doi = {10.1145/2856449}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ParnoHG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GargGH0SW16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Hiding secrets in software: a cryptographic approach to program obfuscation}, journal = {Commun. {ACM}}, volume = {59}, number = {5}, pages = {113--120}, year = {2016}, url = {https://doi.org/10.1145/2902313}, doi = {10.1145/2902313}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/GargGH0SW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GargGH0SW16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits}, journal = {{SIAM} J. Comput.}, volume = {45}, number = {3}, pages = {882--929}, year = {2016}, url = {https://doi.org/10.1137/14095772X}, doi = {10.1137/14095772X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/GargGH0SW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargGHZ16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Functional Encryption Without Obfuscation}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {480--511}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_18}, doi = {10.1007/978-3-662-49099-0\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargGHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGH16, author = {Yilei Chen and Craig Gentry and Shai Halevi}, title = {Cryptanalyses of Candidate Branching Program Obfuscators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {998}, year = {2016}, url = {http://eprint.iacr.org/2016/998}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GentryGIPSS15, author = {Craig Gentry and Jens Groth and Yuval Ishai and Chris Peikert and Amit Sahai and Adam D. Smith}, title = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs}, journal = {J. Cryptol.}, volume = {28}, number = {4}, pages = {820--843}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9184-y}, doi = {10.1007/S00145-014-9184-Y}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GentryHJ015, author = {Craig Gentry and Shai Halevi and Charanjit S. Jutla and Mariana Raykova}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Private Database Access with HE-over-ORAM Architecture}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {172--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_9}, doi = {10.1007/978-3-319-28166-7\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/GentryHJ015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {247--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_12}, doi = {10.1007/978-3-662-47989-6\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryLSW15, author = {Craig Gentry and Allison Bishop Lewko and Amit Sahai and Brent Waters}, editor = {Venkatesan Guruswami}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS} 2015, Berkeley, CA, USA, 17-20 October, 2015}, pages = {151--170}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FOCS.2015.19}, doi = {10.1109/FOCS.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GentryGH15, author = {Craig Gentry and Sergey Gorbunov and Shai Halevi}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Graph-Induced Multilinear Maps from Lattices}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {498--527}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_20}, doi = {10.1007/978-3-662-46497-7\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GentryGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2015}, url = {http://eprint.iacr.org/2015/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGHLST15, author = {Zvika Brakerski and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Amit Sahai and Mehdi Tibouchi}, title = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2015}, url = {http://eprint.iacr.org/2015/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toct/BrakerskiGV14, author = {Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan}, title = {(Leveled) Fully Homomorphic Encryption without Bootstrapping}, journal = {{ACM} Trans. Comput. Theory}, volume = {6}, number = {3}, pages = {13:1--13:36}, year = {2014}, url = {https://doi.org/10.1145/2633600}, doi = {10.1145/2633600}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toct/BrakerskiGV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/Gentry14, author = {Craig Gentry}, title = {Noncommutative Determinant is Hard: {A} Simple Proof Using an Extension of Barrington's Theorem}, booktitle = {{IEEE} 29th Conference on Computational Complexity, {CCC} 2014, Vancouver, BC, Canada, June 11-13, 2014}, pages = {181--187}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CCC.2014.26}, doi = {10.1109/CCC.2014.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/Gentry14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryLW14, author = {Craig Gentry and Allison B. Lewko and Brent Waters}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Witness Encryption from Instance Independent Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {426--443}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_24}, doi = {10.1007/978-3-662-44371-2\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargGHW14, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {518--535}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_29}, doi = {10.1007/978-3-662-44371-2\_29}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargGHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHLO0W14, author = {Craig Gentry and Shai Halevi and Steve Lu and Rafail Ostrovsky and Mariana Raykova and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Garbled {RAM} Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {405--422}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_23}, doi = {10.1007/978-3-642-55220-5\_23}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHLO0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehGGHNSVV14, author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit {ABE} and Compact Garbled Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {533--556}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_30}, doi = {10.1007/978-3-642-55220-5\_30}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehGGHNSVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryH0W14, author = {Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs}, title = {Outsourcing Private {RAM} Computation}, booktitle = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2014, Philadelphia, PA, USA, October 18-21, 2014}, pages = {404--413}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FOCS.2014.50}, doi = {10.1109/FOCS.2014.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryH0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargGH014, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova}, editor = {Yehuda Lindell}, title = {Two-Round Secure {MPC} from Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {74--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_4}, doi = {10.1007/978-3-642-54242-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargGH014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Gentry14, author = {Craig Gentry}, title = {Noncommutative Determinant is Hard: {A} Simple Proof Using an Extension of Barrington's Theorem}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-105}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/105}, eprinttype = {ECCC}, eprint = {TR14-105}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Gentry14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Gentry14a, author = {Craig Gentry}, title = {Computing on the edge of chaos: Structure and randomness in encrypted computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-106}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/106}, eprinttype = {ECCC}, eprint = {TR14-106}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Gentry14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH0W14, author = {Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs}, title = {Garbled {RAM} Revisited, Part {I}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2014}, url = {http://eprint.iacr.org/2014/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH0W14a, author = {Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs}, title = {Outsourcing Private {RAM} Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2014}, url = {http://eprint.iacr.org/2014/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH0W14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLW14, author = {Craig Gentry and Allison Bishop Lewko and Brent Waters}, title = {Witness Encryption from Instance Independent Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2014}, url = {http://eprint.iacr.org/2014/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLSW14, author = {Craig Gentry and Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2014}, url = {http://eprint.iacr.org/2014/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHJ014, author = {Craig Gentry and Shai Halevi and Charanjit S. Jutla and Mariana Raykova}, title = {Private Database Access With HE-over-ORAM Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2014}, url = {http://eprint.iacr.org/2014/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHJ014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGHNSVV14, author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2014}, url = {http://eprint.iacr.org/2014/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGHNSVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gentry14, author = {Craig Gentry}, title = {Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2014}, url = {http://eprint.iacr.org/2014/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gentry14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGHZ14, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry}, title = {Fully Secure Attribute Based Encryption from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2014}, url = {http://eprint.iacr.org/2014/622}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryGH14a, author = {Craig Gentry and Sergey Gorbunov and Shai Halevi}, title = {Graph-Induced Multilinear Maps from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2014}, url = {http://eprint.iacr.org/2014/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryGH14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGHZ14b, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry}, title = {Fully Secure Functional Encryption without Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {666}, year = {2014}, url = {http://eprint.iacr.org/2014/666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGHZ14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHMS14, author = {Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai}, title = {Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2014}, url = {http://eprint.iacr.org/2014/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GentryHPS13, author = {Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart}, title = {Field switching in BGV-style homomorphic encryption}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {663--684}, year = {2013}, url = {https://doi.org/10.3233/JCS-130480}, doi = {10.3233/JCS-130480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GentryHPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BonehGHWW13, author = {Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Private Database Queries Using Somewhat Homomorphic Encryption}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {102--118}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_7}, doi = {10.1007/978-3-642-38980-1\_7}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BonehGHWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalGHS13, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, editor = {Kazue Sako and Palash Sarkar}, title = {Discrete Gaussian Leftover Hash Lemma over Infinite Domains}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {97--116}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_6}, doi = {10.1007/978-3-642-42033-7\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalGHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {75--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_5}, doi = {10.1007/978-3-642-40041-4\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {479--499}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_27}, doi = {10.1007/978-3-642-40084-1\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGH13, author = {Sanjam Garg and Craig Gentry and Shai Halevi}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Candidate Multilinear Maps from Ideal Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_1}, doi = {10.1007/978-3-642-38348-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroGP013, author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Quadratic Span Programs and Succinct NIZKs without PCPs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {626--645}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_37}, doi = {10.1007/978-3-642-38348-9\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroGP013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GargGH0SW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.13}, doi = {10.1109/FOCS.2013.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GargGH0SW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/GentryGHJ0W13, author = {Craig Gentry and Kenny A. Goldman and Shai Halevi and Charanjit S. Jutla and Mariana Raykova and Daniel Wichs}, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {Optimizing {ORAM} and Using It Efficiently for Secure Computation}, booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7\_1}, doi = {10.1007/978-3-642-39077-7\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/GentryGHJ0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrakerskiGH13, author = {Zvika Brakerski and Craig Gentry and Shai Halevi}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Packed Ciphertexts in LWE-Based Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {1--13}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_1}, doi = {10.1007/978-3-642-36362-7\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrakerskiGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ParnoHG013, author = {Bryan Parno and Jon Howell and Craig Gentry and Mariana Raykova}, title = {Pinocchio: Nearly Practical Verifiable Computation}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {238--252}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.47}, doi = {10.1109/SP.2013.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ParnoHG013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GargGSW13, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Witness encryption and its applications}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {467--476}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488667}, doi = {10.1145/2488608.2488667}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/GargGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Gentry13, author = {Craig Gentry}, editor = {Amit Sahai}, title = {Encrypted Messages from the Heights of Cryptomania}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {120--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_7}, doi = {10.1007/978-3-642-36594-2\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Gentry13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2013}, url = {http://eprint.iacr.org/2013/128}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryGHJ0W13, author = {Craig Gentry and Kenny A. Goldman and Shai Halevi and Charanjit S. Jutla and Mariana Raykova and Daniel Wichs}, title = {Optimizing {ORAM} and Using it Efficiently for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2013}, url = {http://eprint.iacr.org/2013/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryGHJ0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGSW13, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, title = {Witness Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2013}, url = {http://eprint.iacr.org/2013/258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParnoGH013, author = {Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova}, title = {Pinocchio: Nearly Practical Verifiable Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2013}, url = {http://eprint.iacr.org/2013/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParnoGH013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2013}, url = {http://eprint.iacr.org/2013/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGHWW13, author = {Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu}, title = {Private Database Queries Using Somewhat Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2013}, url = {http://eprint.iacr.org/2013/422}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGHWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH0SW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2013}, url = {http://eprint.iacr.org/2013/451}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH0SW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH013, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova}, title = {Two-round secure {MPC} from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2013}, url = {http://eprint.iacr.org/2013/601}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryGHVV13, author = {Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, title = {How to Compress (Reusable) Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2013}, url = {http://eprint.iacr.org/2013/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryGHVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGHW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs}, title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2013}, url = {http://eprint.iacr.org/2013/860}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Homomorphic Evaluation of the {AES} Circuit}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {850--867}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_49}, doi = {10.1007/978-3-642-32009-5\_49}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {David Pointcheval and Thomas Johansson}, title = {Fully Homomorphic Encryption with Polylog Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {465--482}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_28}, doi = {10.1007/978-3-642-29011-4\_28}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BrakerskiGV12, author = {Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan}, editor = {Shafi Goldwasser}, title = {(Leveled) fully homomorphic encryption without bootstrapping}, booktitle = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012}, pages = {309--325}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2090236.2090262}, doi = {10.1145/2090236.2090262}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BrakerskiGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_1}, doi = {10.1007/978-3-642-30057-8\_1}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GentryHPS12, author = {Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Ring Switching in BGV-Style Homomorphic Encryption}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {19--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_2}, doi = {10.1007/978-3-642-32928-9\_2}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/GentryHPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Homomorphic Evaluation of the {AES} Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2012}, url = {http://eprint.iacr.org/2012/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroGPR12, author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova}, title = {Quadratic Span Programs and Succinct NIZKs without PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2012}, url = {http://eprint.iacr.org/2012/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroGPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS12a, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Ring Switching in BGV-Style Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2012}, url = {http://eprint.iacr.org/2012/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGH12, author = {Zvika Brakerski and Craig Gentry and Shai Halevi}, title = {Packed Ciphertexts in LWE-based Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2012}, url = {http://eprint.iacr.org/2012/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH12, author = {Sanjam Garg and Craig Gentry and Shai Halevi}, title = {Candidate Multilinear Maps from Ideal Lattices and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2012}, url = {http://eprint.iacr.org/2012/610}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGHS12, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, title = {Sampling Discrete Gaussians Efficiently and Obliviously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2012}, url = {http://eprint.iacr.org/2012/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryH11, author = {Craig Gentry and Shai Halevi}, editor = {Kenneth G. Paterson}, title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {129--148}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_9}, doi = {10.1007/978-3-642-20465-4\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryH11, author = {Craig Gentry and Shai Halevi}, editor = {Rafail Ostrovsky}, title = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {107--109}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.94}, doi = {10.1109/FOCS.2011.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GentryW11, author = {Craig Gentry and Daniel Wichs}, editor = {Lance Fortnow and Salil P. Vadhan}, title = {Separating succinct non-interactive arguments from all falsifiable assumptions}, booktitle = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC} 2011, San Jose, CA, USA, 6-8 June 2011}, pages = {99--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993636.1993651}, doi = {10.1145/1993636.1993651}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GentryW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BrakerskiGV11, author = {Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan}, title = {Fully Homomorphic Encryption without Bootstrapping}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR11-111}}, year = {2011}, url = {https://eccc.weizmann.ac.il/report/2011/111}, eprinttype = {ECCC}, eprint = {TR11-111}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BrakerskiGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGV11, author = {Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan}, title = {Fully Homomorphic Encryption without Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2011}, url = {http://eprint.iacr.org/2011/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH11, author = {Craig Gentry and Shai Halevi}, title = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2011}, url = {http://eprint.iacr.org/2011/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS11, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Fully Homomorphic Encryption with Polylog Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2011}, url = {http://eprint.iacr.org/2011/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS11a, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2011}, url = {http://eprint.iacr.org/2011/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Gentry10, author = {Craig Gentry}, title = {Computing arbitrary functions of encrypted data}, journal = {Commun. {ACM}}, volume = {53}, number = {3}, pages = {97--105}, year = {2010}, url = {https://doi.org/10.1145/1666420.1666444}, doi = {10.1145/1666420.1666444}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Gentry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gentry10, author = {Craig Gentry}, editor = {Tal Rabin}, title = {Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {116--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_7}, doi = {10.1007/978-3-642-14623-7\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gentry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHV10, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, editor = {Tal Rabin}, title = {\emph{i}-Hop Homomorphic Encryption and Rerandomizable Yao Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {155--172}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_9}, doi = {10.1007/978-3-642-14623-7\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroGP10, author = {Rosario Gennaro and Craig Gentry and Bryan Parno}, editor = {Tal Rabin}, title = {Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {465--482}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_25}, doi = {10.1007/978-3-642-14623-7\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DijkGHV10, author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {24--43}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_2}, doi = {10.1007/978-3-642-13190-5\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DijkGHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHV10, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {A Simple BGN-Type Cryptosystem from {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {506--522}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_26}, doi = {10.1007/978-3-642-13190-5\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Gentry10, author = {Craig Gentry}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {391--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_12}, doi = {10.1007/978-3-642-02295-1\_12}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/isc/Gentry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHV10, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2010}, url = {http://eprint.iacr.org/2010/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHV10a, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {A Simple BGN-type Cryptosystem from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2010}, url = {http://eprint.iacr.org/2010/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH10, author = {Craig Gentry and Shai Halevi}, title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2010}, url = {http://eprint.iacr.org/2010/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryW10, author = {Craig Gentry and Daniel Wichs}, title = {Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2010}, url = {http://eprint.iacr.org/2010/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Gentry09, author = {Craig Gentry}, title = {A fully homomorphic encryption scheme}, school = {Stanford University, {USA}}, year = {2009}, url = {https://searchworks.stanford.edu/view/8493082}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Gentry09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Gentry09, author = {Craig Gentry}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Computing on Encrypted Data}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {477}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_32}, doi = {10.1007/978-3-642-10433-6\_32}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/Gentry09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlbrechtGHK09, author = {Martin R. Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Attacking cryptographic schemes based on "perturbation polynomials"}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {1--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653664}, doi = {10.1145/1653662.1653664}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlbrechtGHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryW09, author = {Craig Gentry and Brent Waters}, editor = {Antoine Joux}, title = {Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {171--188}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_10}, doi = {10.1007/978-3-642-01001-9\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Gentry09, author = {Craig Gentry}, editor = {Michael Mitzenmacher}, title = {Fully homomorphic encryption using ideal lattices}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {169--178}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536440}, doi = {10.1145/1536414.1536440}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Gentry09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GentryH09, author = {Craig Gentry and Shai Halevi}, editor = {Omer Reingold}, title = {Hierarchical Identity Based Encryption with Polynomially Many Levels}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {437--456}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_26}, doi = {10.1007/978-3-642-00457-5\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GentryH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtGHK09, author = {Martin R. Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz}, title = {Attacking Cryptographic Schemes Based on "Perturbation Polynomials"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2009}, url = {http://eprint.iacr.org/2009/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtGHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroGP09, author = {Rosario Gennaro and Craig Gentry and Bryan Parno}, title = {Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2009}, url = {http://eprint.iacr.org/2009/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkGHV09, author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {Fully Homomorphic Encryption over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2009}, url = {http://eprint.iacr.org/2009/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkGHV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BoldyrevaGOY08, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {New Multiparty Signature Schemes for Network Routing Applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {3:1--3:39}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410237}, doi = {10.1145/1410234.1410237}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GentryPV08, author = {Craig Gentry and Chris Peikert and Vinod Vaikuntanathan}, editor = {Cynthia Dwork}, title = {Trapdoors for hard lattices and new cryptographic constructions}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {197--206}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374407}, doi = {10.1145/1374376.1374407}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GentryPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryW08, author = {Craig Gentry and Brent Waters}, title = {Adaptive Security in Broadcast Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2008}, url = {http://eprint.iacr.org/2008/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH08, author = {Craig Gentry and Shai Halevi}, title = {Hierarchical Identity Based Encryption with Polynomially Many Levels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2008}, url = {http://eprint.iacr.org/2008/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaGOY07, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {276--285}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315280}, doi = {10.1145/1315245.1315280}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaGOY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BonehGH07, author = {Dan Boneh and Craig Gentry and Michael Hamburg}, title = {Space-Efficient Identity Based Encryption Without Pairings}, booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2007), October 20-23, 2007, Providence, RI, USA, Proceedings}, pages = {647--657}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FOCS.2007.64}, doi = {10.1109/FOCS.2007.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BonehGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GentryPV07, author = {Craig Gentry and Chris Peikert and Vinod Vaikuntanathan}, title = {Trapdoors for Hard Lattices and New Cryptographic Constructions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-133}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-133/index.html}, eprinttype = {ECCC}, eprint = {TR07-133}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GentryPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGH07, author = {Dan Boneh and Craig Gentry and Michael Hamburg}, title = {Space-Efficient Identity Based Encryption Without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2007}, url = {http://eprint.iacr.org/2007/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryPV07, author = {Craig Gentry and Chris Peikert and Vinod Vaikuntanathan}, title = {Trapdoors for Hard Lattices and New Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2007}, url = {http://eprint.iacr.org/2007/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaGOY07, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2007}, url = {http://eprint.iacr.org/2007/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaGOY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryMR06, author = {Craig Gentry and Philip D. MacKenzie and Zulfikar Ramzan}, editor = {Cynthia Dwork}, title = {A Method for Making Password-Based Key Exchange Resilient to Server Compromise}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {142--159}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_9}, doi = {10.1007/11818175\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Gentry06, author = {Craig Gentry}, editor = {Serge Vaudenay}, title = {Practical Identity-Based Encryption Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {445--464}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_27}, doi = {10.1007/11761679\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Gentry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryRW06, author = {Craig Gentry and Zulfikar Ramzan and David P. Woodruff}, title = {Explicit Exclusive Set Systems with Applications to Broadcast Encryption}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {27--38}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.27}, doi = {10.1109/FOCS.2006.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryRW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KempfWRG06, author = {James Kempf and Jonathan Wood and Zulfikar Ramzan and Craig Gentry}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {{IP} Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {196--211}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_14}, doi = {10.1007/11908739\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KempfWRG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryR06, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Identity-Based Aggregate Signatures}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {257--273}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_17}, doi = {10.1007/11745853\_17}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GentryR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GentryRS06, author = {Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Distributed Human Computation}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {177--180}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_24}, doi = {10.1007/978-3-642-04904-0\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/GentryRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gentry06, author = {Craig Gentry}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Distributed Human Computation}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {181--189}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_25}, doi = {10.1007/978-3-642-04904-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gentry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/GentryHJKR05, author = {Craig Gentry and Alejandro Hevia and Ravi Jain and Toshiro Kawahara and Zulfikar Ramzan}, title = {End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {23}, number = {2}, pages = {464--473}, year = {2005}, url = {https://doi.org/10.1109/JSAC.2004.839391}, doi = {10.1109/JSAC.2004.839391}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/GentryHJKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GentryMR05, author = {Craig Gentry and David Molnar and Zulfikar Ramzan}, editor = {Bimal K. Roy}, title = {Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {662--681}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_36}, doi = {10.1007/11593447\_36}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GentryMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GentryMR05, author = {Craig Gentry and Philip D. MacKenzie and Zulfikar Ramzan}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Password authenticated key exchange using hidden smooth subgroups}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {299--309}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102160}, doi = {10.1145/1102120.1102160}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GentryMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehGW05, author = {Dan Boneh and Craig Gentry and Brent Waters}, editor = {Victor Shoup}, title = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {258--275}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_16}, doi = {10.1007/11535218\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GentryRS05, author = {Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine}, editor = {Andrew S. Patrick and Moti Yung}, title = {Secure Distributed \emph{Human} Computation}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {328--332}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_28}, doi = {10.1007/11507840\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GentryRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GentryR05, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Single-Database Private Information Retrieval with Constant Communication Rate}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {803--815}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_65}, doi = {10.1007/11523468\_65}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/GentryR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/GentryRS05, author = {Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine}, editor = {John Riedl and Michael J. Kearns and Michael K. Reiter}, title = {Secure distributed human computation}, booktitle = {Proceedings 6th {ACM} Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005}, pages = {155--164}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1064009.1064026}, doi = {10.1145/1064009.1064026}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/GentryRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGW05, author = {Dan Boneh and Craig Gentry and Brent Waters}, title = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2005}, url = {http://eprint.iacr.org/2005/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GentryR04, author = {Craig Gentry and Zulfikar Ramzan}, title = {Provable Cryptographic Security and its Applications to Mobile Wireless Computing}, journal = {Wirel. Pers. Commun.}, volume = {29}, number = {3-4}, pages = {191--203}, year = {2004}, url = {https://doi.org/10.1023/B:WIRE.0000047062.69722.82}, doi = {10.1023/B:WIRE.0000047062.69722.82}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GentryR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GentryR04, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Pil Joong Lee}, title = {Eliminating Random Permutation Oracles in the Even-Mansour Cipher}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {32--47}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_3}, doi = {10.1007/978-3-540-30539-2\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GentryR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/SuzukiRFGNJ04, author = {Takashi Suzuki and Zulfikar Ramzan and Hiroshi Fujimoto and Craig Gentry and Takehiro Nakayama and Ravi Jain}, editor = {David Chadwick and Bart Preneel}, title = {A System for End-to-End Authentication of Adaptive Multimedia Content}, booktitle = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, pages = {237--249}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24486-7\_18}, doi = {10.1007/0-387-24486-7\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/SuzukiRFGNJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gentry04, author = {Craig Gentry}, editor = {Matthew K. Franklin}, title = {How to Compress Rabin Ciphertexts and Signatures (and More)}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {179--200}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_11}, doi = {10.1007/978-3-540-28628-8\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gentry04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GentryR04, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Ari Juels}, title = {Microcredits for Verifiable Foreign Service Provider Metering}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {9--23}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_3}, doi = {10.1007/978-3-540-27809-2\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GentryR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GentryR04, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Kan Zhang and Yuliang Zheng}, title = {{RSA} Accumulator Based Broadcast Encryption}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {73--86}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_7}, doi = {10.1007/978-3-540-30144-8\_7}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/GentryR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ElwaillyGR04, author = {Farid F. Elwailly and Craig Gentry and Zulfikar Ramzan}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {QuasiModo: Efficient Certificate Validation and Revocation}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {375--388}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_27}, doi = {10.1007/978-3-540-24632-9\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ElwaillyGR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Gentry03, author = {Craig Gentry}, editor = {Eli Biham}, title = {Certificate-Based Encryption and the Certificate Revocation Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {272--293}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_17}, doi = {10.1007/3-540-39200-9\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Gentry03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehGLS03, author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham}, editor = {Eli Biham}, title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {416--432}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_26}, doi = {10.1007/3-540-39200-9\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehGLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gentry03, author = {Craig Gentry}, title = {Certificate-Based Encryption and the Certificate Revocation Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2003}, url = {http://eprint.iacr.org/2003/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gentry03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GentryS02, author = {Craig Gentry and Alice Silverberg}, editor = {Yuliang Zheng}, title = {Hierarchical ID-Based Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {548--566}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_34}, doi = {10.1007/3-540-36178-2\_34}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GentryS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryS02, author = {Craig Gentry and Michael Szydlo}, editor = {Lars R. Knudsen}, title = {Cryptanalysis of the Revised {NTRU} Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {299--320}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_20}, doi = {10.1007/3-540-46035-7\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryS02, author = {Craig Gentry and Alice Silverberg}, title = {Hierarchical ID-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2002}, url = {http://eprint.iacr.org/2002/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGLS02, author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham}, title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2002}, url = {http://eprint.iacr.org/2002/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GentryJSS01, author = {Craig Gentry and Jakob Jonsson and Jacques Stern and Michael Szydlo}, editor = {Colin Boyd}, title = {Cryptanalysis of the {NTRU} Signature Scheme {(NSS)} from Eurocrypt 2001}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {1--20}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_1}, doi = {10.1007/3-540-45682-1\_1}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GentryJSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Gentry01, author = {Craig Gentry}, editor = {Birgit Pfitzmann}, title = {Key Recovery and Message Attacks on NTRU-Composite}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {182--194}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_12}, doi = {10.1007/3-540-44987-6\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Gentry01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.