Encrypted Operator Computing: a novel scheme for computation on encrypted data (original) (raw)

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

Gilad Segev

Advances in Cryptology – EUROCRYPT 2014, 2014

View PDFchevron_right

Coyote: A Compiler for Vectorizing Encrypted Arithmetic Circuits

Raghav Malik

Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3

View PDFchevron_right

On the Practical Security of Inner Product Functional Encryption

Shashank Agrawal

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Towards bridging theory and implementation of cryptographic primitives

Eric Miles

View PDFchevron_right

Block ciphers, pseudorandom functions, and Natural Proofs

Eric Miles

View PDFchevron_right

Garbled Circuits via Structured Encryption

Seny Kamara

View PDFchevron_right

Improved Black-Box Constructions of Composable Secure Computation

Rohit Chatterjee

2020

View PDFchevron_right

A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer

Jonathan Bowen, Peter Breuer

Proc. ESSoS'13, 2013

View PDFchevron_right

On the Security of Practical and Complete Homomorphic Encrypted Computation

Jonathan Bowen

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

Multi-input Functional Encryption

Amit Sahai

Advances in Cryptology – EUROCRYPT 2014, 2014

View PDFchevron_right

Constructions, Lower Bounds, and New Directions in Cryptography and Computational Complexity

Periklis Papakonstantinou

View PDFchevron_right

Efficient Secure Computation with Garbled Circuits

David Evans

View PDFchevron_right

Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits

Eric Miles

Advances in Cryptology – EUROCRYPT 2016, 2016

View PDFchevron_right

Secure Computation with Constant Communication Overhead Using Multiplication Embeddings

Hai Nguyen

Progress in Cryptology – INDOCRYPT 2018, 2018

View PDFchevron_right

Controlled Functional Encryption

Shashank Agrawal

Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

View PDFchevron_right

On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations

A. Yerukhimovich

Lecture Notes in Computer Science, 2009

View PDFchevron_right

On the Security of the “Free-XOR” Technique

Ranjit Kumaresan, Hong-Sheng Zhou

Lecture Notes in Computer Science, 2012

View PDFchevron_right

On cryptography with auxiliary input

Shachar Lovett

Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09, 2009

View PDFchevron_right

Encrypted computing: Speed, security and provable obfuscation against insiders

Peter Breuer

2017 International Carnahan Conference on Security Technology (ICCST), 2017

View PDFchevron_right

Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing

Ivan Damgård

Theory of Cryptography, 2013

View PDFchevron_right

On Obfuscating Compilation for Encrypted Computing

Jonathan Bowen

Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017

View PDFchevron_right

Gate Elimination for Linear Functions and New Feebly Secure Constructions

Sergey Nikolenko

View PDFchevron_right

Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)

Hai Nguyen

Theory of Cryptography, 2018

View PDFchevron_right

Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF

Tapas Pal

Information Security and Privacy, 2021

View PDFchevron_right

Functional Encryption for Inner Product Predicates from Learning with Errors

David Freeman

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

Debayan Gupta, Kevin Butler, Joan Feigenbaum

21st ACM Conference on Computer and Communications Security, 2014

View PDFchevron_right

Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design

Herve Chabanne, Julien Bringer

BFCA'05: Boolean functions: …, 2005

View PDFchevron_right

Post-Zeroizing Obfuscation: The case of Evasive Circuits

Eric Miles

IACR Cryptol. ePrint Arch., 2015

View PDFchevron_right

A New Class of Codes for Boolean Masking of Cryptographic Computations

C. Carlet

IEEE Transactions on Information Theory, 2012

View PDFchevron_right

Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops

Sadam Hussain

Wireless Personal Communications, 2019

View PDFchevron_right

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction

Kishan Gupta

IEEE Transactions on Information Theory, 2006

View PDFchevron_right

Attribute-Based Access Control for Inner Product Functional Encryption from LWE

Tapas Pal

Progress in Cryptology – LATINCRYPT 2021, 2021

View PDFchevron_right

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

Alessandra Scafuro, Ivan Visconti

Lecture Notes in Computer Science, 2013

View PDFchevron_right

A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation

Nitin Janwe

International Journal of Advance Research and Innovative Ideas in Education, 2018

View PDFchevron_right