Back to Results
First PageMeta Content
Oblivious transfer / Ciphertext indistinguishability / Verifiable computing / Cryptography / Homomorphic encryption / RSA


Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡
Add to Reading List

Document Date: 2015-03-24 12:50:07


Open Document

File Size: 405,45 KB

Share Result on Facebook

Company

US Army Research Laboratory / /

Country

United States / /

/

Event

FDA Phase / /

Facility

US Army Research Laboratory / University of Maryland / Building Blocks Garbling Schemes Here / /

IndustryTerm

generation algorithm / probabilistic algorithm / homomorphic evaluation algorithm / decryption algorithm / polynomial-time algorithm / polynomial-time algorithms / oblivious transfer protocol / evaluation algorithm / cryptographic applications / circuit computing / deterministic algorithm / encryption algorithm / polynomialtime algorithm / /

Organization

University of Maryland / National Science Foundation / US Government / UK Government / Department of Computer Science / United States Army / UK Ministry of Defence / /

Person

Hong-Sheng Zhou§ Abstract Fully / Jonathan Katz† Aishwarya Thiruvengadam / /

Position

Private / /

Product

Nie02 / CLOS02 / OT2 / Yao86 / /

ProvinceOrState

Maryland / /

Technology

oblivious transfer protocol / randomized algorithm / semi-honest OT protocol / homomorphic evaluation algorithm / valid encryption / 2-move OT protocol / encryption algorithm / multi-message receiver non-committing encryption / four polynomial-time algorithms / receiver-non-committing encryption / private key / secret key / polynomialtime algorithm / Semi-honest two-move OT protocol / probabilistic algorithm / Encryption / cryptography / adaptively secure encryption / key generation algorithm / public key / circuit-private homomorphic encryption / public-key encryption / non-uniform / polynomial-time algorithms / multi-message receiver non-commiting encryption / 2 The protocol / evaluation algorithm / non-committing encryption / deterministic algorithm / regular public key encryption / receiver non-committing encryption / non-uniform / polynomial-time algorithm / simulation / decryption algorithm / key-generation algorithm / interactive protocol / /

SocialTag