Sciweavers

7 search results - page 2 / 2
» Function-Hiding Inner Product Encryption
Sort
View
120
Voted
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
15 years 7 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry
ICDCS
2011
IEEE
14 years 11 days ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...