Sciweavers

7 search results - page 2 / 2
» Function-Hiding Inner Product Encryption
Sort
View
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
13 years 12 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry
ICDCS
2011
IEEE
12 years 4 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...