Sciweavers

24188 search results - page 96 / 4838
» Computing on Encrypted Data
Sort
View
121
Voted
WCNC
2010
IEEE
15 years 6 months ago
DCP-EW: Distributed Congestion-Control Protocol for Encrypted Wireless Networks
Abstract— VCP suffers from a relatively low speed of convergence and exhibits biased fairness in moderate bandwidth high delay networks due to utilizing an insufficient amount o...
Xiaolong Li, Homayoun Yousefi'zadeh
127
Voted
FOCS
2006
IEEE
15 years 8 months ago
Explicit Exclusive Set Systems with Applications to Broadcast Encryption
A family of subsets C of [n] def = {1, . . . , n} is (r, t)exclusive if for every S ⊂ [n] of size at least n − r, there exist S1, . . . , St ∈ C with S = S1∪S2∪· · · ...
Craig Gentry, Zulfikar Ramzan, David P. Woodruff
107
Voted
JOC
2006
69views more  JOC 2006»
15 years 2 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
100
Voted
JOC
2010
82views more  JOC 2010»
14 years 9 months ago
A Verifiable Secret Shuffle of Homomorphic Encryptions
Abstract. A shuffle consists of a permutation and re-encryption of a set of input ciphertexts. One application of shuffles is to build mix-nets. We suggest an honest verifier zero-...
Jens Groth
139
Voted
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 5 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart