Sciweavers

6 search results - page 1 / 2
» Unification Modulo Homomorphic Encryption
Sort
View
CCS
2010
ACM
13 years 2 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and t...
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...
FROCOS
2009
Springer
13 years 9 months ago
Unification Modulo Homomorphic Encryption
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 7 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 8 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CCS
1998
ACM
13 years 9 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern