搜索结果: 106-120 共查到“军事学 Homomorphic encryption”相关记录208条 . 查询时间(0.092 秒)
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
key recovery attack private key
2016/1/6
In this paper we present a key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme proposed by Bos et al~\cite{NTRUbasedFHE} in 2013. The attack allows us to compu...
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Homomorphic encryption Composite Residuosity assumption tree-shaped assumption family
2016/1/5
Cryptographic primitives based on infinite families of progressively weaker assumptions
have been proposed by Hofheinz–Kiltz and by Shacham (the n-Linear assumptions)
and by Escala et al. (the Matri...
Controlled Homomorphic Encryption: Definition and Construction
Functional Encryption Non-malleability Fully Homomorphic Encryption
2016/1/5
Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes
(FunctEs) have a tremendous impact in Cryptography both for the natural questions that
they address and for the wide ran...
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Homomorphic encryption Private information retrieval Cryptanalysis
2016/1/5
Private Information Retrieval (PIR) protects users' privacy in outsourced storage applications and can be achieved using additively homomorphic encryption schemes. Several PIR schemes with a “real wor...
Linearly Homomorphic Encryption from DDH
Linearly Homomorphic Encryption Orders of Quadratic Fields
2016/1/4
We design a linearly homomorphic encryption scheme whose security relies on
the hardness of the decisional Diffie-Hellman problem. Our approach requires some special
features of the underlying group...
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
fully homomorphic encryption identity-based ring learning with errors
2016/1/4
Fully homomorphic is an encryption scheme that allows for data to be stored and
processed in an encrypted format, which gives the cloud provider a solution to host and process
data without even know...
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Somewhat Homomorphic Encryption Key Recovery Attack IND-CCA1 Security
2016/1/4
A key recovery attack allows an attacker to recover the private key of an
underlying encryption scheme when given a number of decryption oracle accesses. Previous
research has shown that most existi...
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
NTRU-based homomorphic encryption adaptive key recovery attack
2016/1/4
In this paper we present adaptive key recovery attacks on NTRU-based somewhat homomorphic
encryption schemes. Among such schemes, we study the proposal by Bos et al [BLLN13]
in 2013. Given access to...
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Fully homomorphic encryption Adaptive security
2016/1/3
Fully homomorphic encryption (FHE) is a form of public-key encryption that enables arbitrary
computation over encrypted data. The past few years have seen several realizations of FHE
under different...
HETest: A Homomorphic Encryption Testing Framework
homomorphic encryption testing evaluation
2015/12/31
In this work, we present a generic open-source software framework that can evaluate the
correctness and performance of homomorphic encryption software. Our framework, called HEtest, automates
the en...
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
circular security fully homomorphic encryption LWE problem
2015/12/30
Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully
homomorphic encryption schemes share two common flaws that they all use large-scale secret ...
Practical Fully Homomorphic Encryption without Noise Reduction
Fully Homomorphic Encryption Implementation
2015/12/30
We present a new fully homomorphic encryption (FHE) scheme
that is efficient for practical applications. The main feature of our scheme
is that noise reduction considered essential in current FHE sc...
Fully Homomorphic Encryption without bootstrapping
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis
2015/12/30
Gentry抯 bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In this paper I propose a new fully homomorphic encryption scheme on non-associative octonion ring ...
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
public-key cryptography fully homomorphic encryption
2015/12/30
Recently, IACR ePrint archive posted two fully homomorphic encryption
schemes without bootstrapping. In this note, we show that these schemes are
trivially insecure. Furthermore, we also show that t...
Quantum homomorphic encryption for circuits of low $T$-gate complexity
quantum cryptography public-key cryptography secret-key cryptography
2015/12/30
Fully homomorphic encryption is an encryption method with the property that any computation
on the plaintext can be performed by a party having access to the ciphertext only.
Here, we formally defin...