162
Voted
EUROCRYPT
13 years 6 months ago
2012 Springer
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ˜O(...
134
click to vote
EUROCRYPT
13 years 6 months ago
2012 Springer
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
146
click to vote
EUROCRYPT
13 years 6 months ago
2012 Springer
Decoding random linear codes is a well studied problem with many applications in complexity theory and cryptography. The security of almost all coding and LPN/LWE-based schemes rel...
140
Voted
EUROCRYPT
13 years 6 months ago
2012 Springer
We present a new approach for creating chosen ciphertext secure encryption. The focal point ork is a new abstraction that we call Detectable Chosen Ciphertext Security (DCCA). Int...
157
Voted
EUROCRYPT
13 years 6 months ago
2012 Springer
sion of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report 2012/012. Malleability ...
|