Additively Homomorphic Encryption with d-Operand Multiplications
Open Access
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Fully Homomorphic Encryption over the IntegersLecture Notes in Computer Science, 2010
- Lattice-based homomorphic encryption of vector spacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Cryptanalysis of a homomorphic public-key cryptosystem over a finite groupJournal of Mathematical Cryptology, 2007
- Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism schemeInformation Processing Letters, 2006
- Evaluating 2-DNF Formulas on CiphertextsLecture Notes in Computer Science, 2005
- A Provably Secure Additive and Multiplicative Privacy Homomorphism*Lecture Notes in Computer Science, 2002
- A new privacy homomorphism and applicationsInformation Processing Letters, 1996
- Combinatorial cryptosystems galore!Contemporary Mathematics, 1994
- Bounded-width polynomial-size branching programs recognize exactly those languages in NC1Journal of Computer and System Sciences, 1989
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985