搜索结果: 1-15 共查到“Ciphertexts”相关记录36条 . 查询时间(0.046 秒)
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
multi-key homomorphic encryption packed ciphertext ring learning with errors
2019/5/21
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted data. López-Alt et al. (STOC 2012) proposed a generalized notion of HE, called Multi-Key Homomorphic Encryption (M...
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Zero-Knowledge Proofs Bulletproofs FHE
2019/1/26
In applications of fully-homomorphic encryption (FHE) that involve computation on encryptions produced by several users, it is important that each user proves that her input is indeed well-formed. Thi...
Efficient Multi-key FHE with short extended ciphertexts and less public parameters
Multi-key FHE BGV scheme ciphertext extension
2018/11/2
Multi-Key Full Homomorphic Encryption scheme (MKFHE) can perform arbitrary operation on encrypted data under different public keys (users), and the final ciphertext can be jointly decrypted. Therefore...
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
broadcast encryption bilinear group
2018/5/2
We present a new public key broadcast encryption scheme where both the ciphertext and secret keys consist of a constant number of group elements. Our result improves upon the work of Boneh, Gentry, an...
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Decrypt All Ciphertexts cryptographic protocols
2018/3/5
In this work, we examine the feasibility of secure and undetectable point-to-point communication in a world where governments can read all the encrypted communications of their citizens. We consider a...
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
zero knowledge fully homomorphic encryption verifiable decryption
2018/1/11
Zero-knowledge proofs of knowledge and fully-homomorphic encryption are two areas that have seen considerable advances in recent years, and these two techniques are used in conjunction in the context ...
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Malicious cryptography environmental keys rerandomization
2017/10/16
Protecting malware using encryption prevents an analyst, defending some computer(s) in the network, from analyzing the malicious code and identifying the intentions of the malware author. We discuss m...
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Public Key Encryption Keyword Search
2017/8/10
Public-key encryption with keyword search (PEKS) allows a sender to generate keyword-searchable ciphertexts using a receiver’s public key and upload them to a server. Upon receiving a keyword-search t...
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
public-key cryptography Ring-LWE
2017/4/27
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduct...
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
public-key cryptography fully homomorphic encryption
2016/4/7
We present a multi-key fully homomorphic encryption scheme that supports an unbounded number of homomorphic operations for an unbounded number of parties. Namely, it allows to perform arbitrarily many...
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
Stream Ciphers Homomorphic cryptography
2016/3/9
Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have recently been proposed
for two main reasons. First, minimizing the implementation (time and memory) overheads that are inherent ...
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Public-key encryption selective-opening security lossy encryption
2016/2/24
In a selective-opening (SO) attack on an encryption scheme, an adversary A gets a number of ciphertexts (with possibly related plain- texts), and can then adaptively select a subset of those ciphertex...
By definition, fully homomorphic encryption (FHE) schemes
support homomorphic decryption, and all known FHE constructions are
bootstrapped from a Somewhat Homomorphic Encryption (SHE) scheme
via th...
In this work we describe a message packing and unpacking
method for homomorphic ciphertexts. Messages are packed into the coefficients
of plaintext polynomials. We propose an unpacking procedure
wh...
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
Public-key encryption Self-updatable encryption Chosen-ciphertext security
2016/1/27
Self-updatable encryption (SUE) is a new kind of public-key encryption, motivated by cloud computing,
which enables anyone (i.e. cloud server with no access to private keys) to update a past cipherte...