Limits of Provable Security for Homomorphic Encryption (English)
- New search for: Bogdanov, Andrej
- New search for: Lee, Chin-Ho
- New search for: Bogdanov, Andrej
- New search for: Lee, Chin-Ho
In:
Advances in Cryptology, CRYPTO, Annual International Cryptology Conference, 33
;
111-128
;
2013
-
ISSN:
- Conference paper / Print
-
Title:Limits of Provable Security for Homomorphic Encryption
-
Contributors:Bogdanov, Andrej ( author ) / Lee, Chin-Ho ( author )
-
Published in:Lecture Notes in Computer Science ; 8042 ; 111-128
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013
-
Size:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Practical Bootstrapping in Quasilinear TimeAlperin-Sheriff, J. / Peikert, C. et al. | 2013
- 21
-
Hardness of SIS and LWE with Small ParametersMicciancio, D. / Peikert, C. et al. | 2013
- 40
-
Lattice Signatures and Bimodal GaussiansDucas, L. / Durmus, A. / Lepoint, T. / Lyubashevsky, V. et al. | 2013
- 57
-
Learning with Rounding, Revisited: New Reduction, Properties and ApplicationsAlwen, J. / Krenn, S. / Pietrzak, K. / Wichs, D. et al. | 2013
- 75
-
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-BasedGentry, C. / Sahai, A. / Waters, B. et al. | 2013
- 93
-
A Uniform Min-Max Theorem with Applications in CryptographyVadhan, S. / Zheng, C.J. et al. | 2013
- 111
-
Limits of Provable Security for Homomorphic EncryptionBogdanov, A. / Lee, C.H. et al. | 2013
- 129
-
Counter-CryptanalysisStevens, M. et al. | 2013
- 147
-
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control SystemStrobel, D. / Driessen, B. / Kasper, T. / Leander, G. / Oswald, D. / Schellenberg, F. / Paar, C. et al. | 2013
- 165
-
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking (Extended Abstract)Zhang, B. / Xu, C. / Feng, D. et al. | 2013
- 183
-
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128Fouque, P.-A. / Jean, J. / Peyrin, T. et al. | 2013
- 204
-
Bounds in Shallows and in MiseriesBlondeau, C. / Bogdanov, A. / Leander, G. et al. | 2013
- 222
-
Sieve-in-the-Middle: Improved MITM AttacksCanteaut, A. / Naya-Plasencia, M. / Vayssiere, B. et al. | 2013
- 241
-
Construction of Differential Characteristics in ARX Designs Application to SkeinLeurent, G. et al. | 2013
- 259
-
On Fair Exchange, Fair Coins and Fair SamplingAgrawal, S. / Prabhakaran, M. et al. | 2013
- 277
-
Limits on the Power of Cryptographic Cheap TalkHubacek, P. / Nielsen, J.B. / Rosen, A. et al. | 2013
- 298
-
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private ProtocolsGoyal, V. / Mironov, I. / Pandey, O. / Sahai, A. et al. | 2013
- 316
-
Secure Computation against Adaptive Auxiliary InformationBoyle, E. / Garg, S. / Jain, A. / Kalai, Y.T. / Sahai, A. et al. | 2013
- 335
-
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable AssumptionsStandaert, F.-X. / Pereira, O. / Yu, Y. et al. | 2013
- 353
-
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean QueriesCash, D. / Jarecki, S. / Jutla, C. / Krawczyk, H. / Rosu, M.-C. / Steiner, M. et al. | 2013
- 374
-
Message-Locked Encryption for Lock-Dependent MessagesAbadi, M. / Boneh, D. / Mironov, I. / Raghunathan, A. / Segev, G. et al. | 2013
- 392
-
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N QueriesRistenpart, T. / Yilek, S. et al. | 2013
- 410
-
Key Homomorphic PRFs and Their ApplicationsBoneh, D. / Lewi, K. / Montgomery, H. / Raghunathan, A. et al. | 2013
- 429
-
On the Security of the TLS Protocol: A Systematic AnalysisKrawczyk, H. / Paterson, K.G. / Wee, H. et al. | 2013
- 449
-
New Techniques for SPHFs and Efficient One-Round PAKE ProtocolsBenhamouda, F. / Blazy, O. / Chevalier, C. / Pointcheval, D. / Vergnaud, D. et al. | 2013
- 476
-
Practical Multilinear Maps over the IntegersCoron, J.-S. / Lepoint, T. / Tibouchi, M. et al. | 2013
- 494
-
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate SignaturesHohenberger, S. / Sahai, A. / Waters, B. et al. | 2013
- 513
-
Programmable Hash Functions in the Multilinear SettingFreire, E.S.V. / Hofheinz, D. / Paterson, K.G. / Striecks, C. et al. | 2013
- 531
-
On the Indifferentiability of Key-Alternating CiphersAndreeva, E. / Bogdanov, A. / Dodis, Y. / Mennink, B. / Steinberger, J.P. et al. | 2013
- 551
-
Plain versus Randomized Cascading-Based Key-Length Extension for Block CiphersGazi, P. et al. | 2013
- 571
-
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible FunctionsKiltz, E. / Pietrzak, K. / Szegedy, M. et al. | 2013