22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[DGHV10] Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic<br />

encryption over the integers. In EUROCRYPT, pages 24–43, 2010. Full<br />

Version in http://eprint.iacr.org/2009/616.pdf.<br />

[Gen09a]<br />

Craig Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University,<br />

2009. http://crypto.stanford.edu/craig.<br />

[Gen09b] Craig Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages<br />

169–178, 2009.<br />

[GGH97]<br />

[GH11]<br />

[GHS11a]<br />

[GHS11b]<br />

[GPV08]<br />

[LPR10]<br />

[MM11]<br />

[MP11]<br />

[MV10]<br />

[Ost11]<br />

[Pei09]<br />

[RAD78]<br />

Oded Goldreich, Shafi Goldwasser, and Shai Halevi. Eliminating decryption errors in<br />

the ajtai-dwork cryptosystem. In Burton S. Kaliski Jr., editor, CRYPTO, volume 1294<br />

of Lecture Notes in Computer Science, pages 105–111. Springer, 1997.<br />

Craig Gentry and Shai Halevi. Fully homomorphic encryption without squashing using<br />

depth-3 arithmetic circuits. In Ostrovsky [Ost11], pages 107–109.<br />

Craig Gentry, Shai Halevi, and Nigel P. Smart. Better bootstrapping in fully homomorphic<br />

encryption. IACR Cryptology ePrint Archive, 2011:680, 2011.<br />

Craig Gentry, Shai Halevi, and Nigel P. Smart. Fully homomorphic encryption with<br />

polylog overhead. IACR Cryptology ePrint Archive, 2011:566, 2011.<br />

Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices<br />

and new cryptographic constructions. In Cynthia Dwork, editor, STOC, pages 197–206.<br />

ACM, 2008.<br />

Vadim Lyubashevsky, Chris Peikert, and Oded Regev. On ideal lattices and learning<br />

with errors over rings. In EUROCRYPT, pages 1–23, 2010. Draft of full version was<br />

provided by the authors.<br />

Daniele Micciancio and Petros Mol. Pseudorandom knapsacks and the sample complexity<br />

of lwe search-to-decision reductions. In Rogaway [Rog11], pages 465–484.<br />

Daniele Micciancio and Chris Peikert. Trapdoors for lattices: Simpler, tighter, faster,<br />

smaller. IACR Cryptology ePrint Archive, 2011:501, 2011. To appear in Eurocrypt<br />

2012.<br />

Daniele Micciancio and Panagiotis Voulgaris. A deterministic single exponential time<br />

algorithm for most lattice problems based on voronoi cell computations. In Leonard J.<br />

Schulman, editor, STOC, pages 351–358. ACM, 2010.<br />

Rafail Ostrovsky, editor. IEEE 52nd Annual Symposium on Foundations of Computer<br />

Science, FOCS 2011, Palm Springs, CA, USA, October 22-25, 2011. IEEE, 2011.<br />

Chris Peikert. Public-key cryptosystems from the worst-case shortest vector problem:<br />

extended abstract. In STOC, pages 333–342, 2009.<br />

R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms.<br />

In Foundations of Secure Computation, pages 169–177. Academic Press, 1978.<br />

18<br />

6. FHE without Modulus Switching

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!