OpenFHE: Open-Source Fully Homomorphic Encryption Library. | 0 | 0.34 | 2022 |
Achievable CCA2 Relaxation for Homomorphic Encryption. | 0 | 0.34 | 2022 |
Threshold Cryptography as a Service (in the Multiserver and YOSO Models) | 0 | 0.34 | 2022 |
Random-Index PIR and Applications | 0 | 0.34 | 2021 |
Round-Optimal Secure Multi-Party Computation | 1 | 0.35 | 2021 |
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties. | 0 | 0.34 | 2021 |
Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation | 0 | 0.34 | 2019 |
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. | 3 | 0.40 | 2019 |
Homomorphic Encryption Standard. | 0 | 0.34 | 2019 |
Homomorphic Training of 30, 000 Logistic Regression Models. | 0 | 0.34 | 2019 |
Best Possible Information-Theoretic Mpc | 0 | 0.34 | 2018 |
Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation. | 7 | 0.57 | 2018 |
Advanced Cryptography: Promise and Challenges. | 1 | 0.35 | 2018 |
Doing Real Work with FHE: The Case of Logistic Regression. | 4 | 0.48 | 2018 |
Round-Optimal Secure Multi-Party Computation. | 4 | 0.38 | 2018 |
Privacy-Preserving Search of Similar Patients in Genomic Data. | 5 | 0.45 | 2018 |
Non-Interactive Multiparty Computation Without Correlated Randomness. | 2 | 0.37 | 2017 |
Four Round Secure Computation without Setup. | 7 | 0.42 | 2017 |
Implementing BP-Obfuscation Using Graph-Induced Encoding. | 7 | 0.43 | 2017 |
Cryptanalyses of Candidate Branching Program Obfuscators. | 18 | 0.58 | 2017 |
Hiding secrets in software: a cryptographic approach to program obfuscation. | 1 | 0.36 | 2016 |
Spooky Encryption and its Applications. | 15 | 0.57 | 2016 |
Functional Encryption Without Obfuscation. | 33 | 0.80 | 2016 |
Secure Multiparty Computation With General Interaction Patterns | 7 | 0.48 | 2016 |
Graded Encoding, Variations on a Scheme. | 13 | 0.62 | 2015 |
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. | 0 | 0.34 | 2015 |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 70 | 1.58 | 2015 |
Cryptanalysis of the Quadratic Zero-Testing of GGH. | 11 | 0.52 | 2015 |
Fully Secure Attribute Based Encryption from Multilinear Maps. | 0 | 0.34 | 2014 |
Outsourcing Private RAM Computation | 42 | 1.04 | 2014 |
Graph-Induced Multilinear Maps from Lattices | 4 | 0.41 | 2014 |
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero. | 26 | 0.98 | 2014 |
Algorithms in HElib. | 45 | 1.69 | 2014 |
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. | 106 | 1.92 | 2014 |
Fully Secure Functional Encryption without Obfuscation. | 51 | 1.89 | 2014 |
The Hash Function "Fugue". | 0 | 0.34 | 2014 |
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits | 337 | 7.24 | 2013 |
Two-round secure MPC from Indistinguishability Obfuscation. | 71 | 1.56 | 2013 |
Field switching in BGV-style homomorphic encryption | 25 | 1.46 | 2013 |
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. | 24 | 0.67 | 2013 |
Private database queries using somewhat homomorphic encryption | 62 | 1.66 | 2013 |
Attribute-Based Encryption for Circuits from Multilinear Maps. | 112 | 3.18 | 2013 |
Discrete Gaussian Leftover Hash Lemma over Infinite Domains | 11 | 0.88 | 2013 |
Optimizing ORAM and Using it Efficiently for Secure Computation. | 74 | 1.89 | 2013 |
Fully homomorphic encryption with polylog overhead | 165 | 5.92 | 2012 |
Ring switching in BGV-Style homomorphic encryption | 17 | 1.25 | 2012 |
Candidate Multilinear Maps from Ideal Lattices and Applications. | 28 | 1.58 | 2012 |
Better bootstrapping in fully homomorphic encryption | 69 | 2.53 | 2012 |
Leakage-Tolerant interactive protocols | 41 | 0.98 | 2012 |
Collision-Free Hashing from Lattice Problems. | 54 | 5.93 | 2011 |