default search action
Craig Gentry
Person information
- affiliation: IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA
- award (2010): Grace Murray Hopper Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c81]Catherine K. Craven, Raudel Bobadilla, Edward Yao, Caleb Castillo, Julio Cerroblanco, Bertha E. Flores, Mamta Jain, Alex Radunsky, Mikulas Plesak, Craig Gentry, Riddhiman Das, Gharib Gharibi:
STOP-HCV-HCC Program: Privacy-Preserving Innovation for Remote Data Access Analytics at Federally Qualified Health Centers in South Texas. MIE 2024: 1716-1717 - 2022
- [c80]Craig Gentry, Shai Halevi, Vadim Lyubashevsky:
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties. EUROCRYPT (1) 2022: 458-487 - [c79]Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. TCC (2) 2022: 70-99 - [i66]Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022: 282 (2022) - 2021
- [c78]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - [c77]Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-Index PIR and Applications. TCC (3) 2021: 32-61 - [i65]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i64]Craig Gentry, Shai Halevi, Vadim Lyubashevsky:
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties. IACR Cryptol. ePrint Arch. 2021: 1397 (2021) - 2020
- [c76]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Public Blockchain Keep a Secret? TCC (1) 2020: 260-290 - [i63]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020: 464 (2020) - [i62]Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-index PIR with Applications to Large-Scale Secure MPC. IACR Cryptol. ePrint Arch. 2020: 1248 (2020)
2010 – 2019
- 2019
- [j12]Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich:
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free. Proc. Priv. Enhancing Technol. 2019(3): 87-107 (2019) - [c75]Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:
Homomorphic Encryption for Finite Automata. ASIACRYPT (2) 2019: 473-502 - [c74]Craig Gentry, Shai Halevi:
Compressible FHE with Applications to PIR. TCC (2) 2019: 438-464 - [i61]Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:
Homomorphic Encryption for Finite Automata. IACR Cryptol. ePrint Arch. 2019: 176 (2019) - [i60]Craig Gentry, Shai Halevi:
Compressible FHE with Applications to PIR. IACR Cryptol. ePrint Arch. 2019: 733 (2019) - 2018
- [c73]Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup:
Doing Real Work with FHE: The Case of Logistic Regression. WAHC@CCS 2018: 1-12 - [c72]Craig Gentry, Adam O'Neill, Leonid Reyzin:
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. Public Key Cryptography (2) 2018: 34-57 - [i59]Craig Gentry, Charanjit S. Jutla:
Obfuscation using Tensor Products. Electron. Colloquium Comput. Complex. TR18 (2018) - [i58]Craig Gentry, Adam O'Neill, Leonid Reyzin:
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. IACR Cryptol. ePrint Arch. 2018: 70 (2018) - [i57]Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup:
Doing Real Work with FHE: The Case of Logistic Regression. IACR Cryptol. ePrint Arch. 2018: 202 (2018) - [i56]Craig Gentry, Charanjit S. Jutla:
Obfuscation Using Tensor Products. IACR Cryptol. ePrint Arch. 2018: 756 (2018) - [i55]Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich:
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free. IACR Cryptol. ePrint Arch. 2018: 1235 (2018) - 2017
- [j11]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. Algorithmica 79(4): 1353-1373 (2017) - [c71]Yilei Chen, Craig Gentry, Shai Halevi:
Cryptanalyses of Candidate Branching Program Obfuscators. EUROCRYPT (3) 2017: 278-307 - 2016
- [j10]Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: nearly practical verifiable computation. Commun. ACM 59(2): 103-112 (2016) - [j9]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5): 113-120 (2016) - [j8]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits. SIAM J. Comput. 45(3): 882-929 (2016) - [c70]Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Functional Encryption Without Obfuscation. TCC (A2) 2016: 480-511 - [i54]Yilei Chen, Craig Gentry, Shai Halevi:
Cryptanalyses of Candidate Branching Program Obfuscators. IACR Cryptol. ePrint Arch. 2016: 998 (2016) - 2015
- [j7]Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith:
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs. J. Cryptol. 28(4): 820-843 (2015) - [c69]Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access with HE-over-ORAM Architecture. ACNS 2015: 172-191 - [c68]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c67]Craig Gentry, Allison Bishop Lewko, Amit Sahai, Brent Waters:
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption. FOCS 2015: 151-170 - [c66]Craig Gentry, Sergey Gorbunov, Shai Halevi:
Graph-Induced Multilinear Maps from Lattices. TCC (2) 2015: 498-527 - [i53]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i52]Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. IACR Cryptol. ePrint Arch. 2015: 845 (2015) - 2014
- [j6]Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:
(Leveled) Fully Homomorphic Encryption without Bootstrapping. ACM Trans. Comput. Theory 6(3): 13:1-13:36 (2014) - [c65]Craig Gentry:
Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's Theorem. CCC 2014: 181-187 - [c64]Craig Gentry, Allison B. Lewko, Brent Waters:
Witness Encryption from Instance Independent Assumptions. CRYPTO (1) 2014: 426-443 - [c63]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. CRYPTO (1) 2014: 518-535 - [c62]Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited. EUROCRYPT 2014: 405-422 - [c61]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. EUROCRYPT 2014: 533-556 - [c60]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. FOCS 2014: 404-413 - [c59]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-Round Secure MPC from Indistinguishability Obfuscation. TCC 2014: 74-94 - [i51]Craig Gentry:
Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's Theorem. Electron. Colloquium Comput. Complex. TR14 (2014) - [i50]Craig Gentry:
Computing on the edge of chaos: Structure and randomness in encrypted computation. Electron. Colloquium Comput. Complex. TR14 (2014) - [i49]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited, Part I. IACR Cryptol. ePrint Arch. 2014: 82 (2014) - [i48]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. IACR Cryptol. ePrint Arch. 2014: 148 (2014) - [i47]Craig Gentry, Allison Bishop Lewko, Brent Waters:
Witness Encryption from Instance Independent Assumptions. IACR Cryptol. ePrint Arch. 2014: 273 (2014) - [i46]Craig Gentry, Allison B. Lewko, Amit Sahai, Brent Waters:
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption. IACR Cryptol. ePrint Arch. 2014: 309 (2014) - [i45]Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access With HE-over-ORAM Architecture. IACR Cryptol. ePrint Arch. 2014: 345 (2014) - [i44]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. IACR Cryptol. ePrint Arch. 2014: 356 (2014) - [i43]Craig Gentry:
Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation. IACR Cryptol. ePrint Arch. 2014: 610 (2014) - [i42]Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Fully Secure Attribute Based Encryption from Multilinear Maps. IACR Cryptol. ePrint Arch. 2014: 622 (2014) - [i41]Craig Gentry, Sergey Gorbunov, Shai Halevi:
Graph-Induced Multilinear Maps from Lattices. IACR Cryptol. ePrint Arch. 2014: 645 (2014) - [i40]Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Fully Secure Functional Encryption without Obfuscation. IACR Cryptol. ePrint Arch. 2014: 666 (2014) - [i39]Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai:
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero. IACR Cryptol. ePrint Arch. 2014: 929 (2014) - 2013
- [j5]Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart:
Field switching in BGV-style homomorphic encryption. J. Comput. Secur. 21(5): 663-684 (2013) - [c58]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. ACNS 2013: 102-118 - [c57]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Discrete Gaussian Leftover Hash Lemma over Infinite Domains. ASIACRYPT (1) 2013: 97-116 - [c56]Craig Gentry, Amit Sahai, Brent Waters:
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. CRYPTO (1) 2013: 75-92 - [c55]Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. CRYPTO (2) 2013: 479-499 - [c54]Sanjam Garg, Craig Gentry, Shai Halevi:
Candidate Multilinear Maps from Ideal Lattices. EUROCRYPT 2013: 1-17 - [c53]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. EUROCRYPT 2013: 626-645 - [c52]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits. FOCS 2013: 40-49 - [c51]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using It Efficiently for Secure Computation. Privacy Enhancing Technologies 2013: 1-18 - [c50]Zvika Brakerski, Craig Gentry, Shai Halevi:
Packed Ciphertexts in LWE-Based Homomorphic Encryption. Public Key Cryptography 2013: 1-13 - [c49]Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. IEEE Symposium on Security and Privacy 2013: 238-252 - [c48]Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters:
Witness encryption and its applications. STOC 2013: 467-476 - [c47]Craig Gentry:
Encrypted Messages from the Heights of Cryptomania. TCC 2013: 120-121 - [i38]Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 128 (2013) - [i37]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using it Efficiently for Secure Computation. IACR Cryptol. ePrint Arch. 2013: 239 (2013) - [i36]Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters:
Witness Encryption and its Applications. IACR Cryptol. ePrint Arch. 2013: 258 (2013) - [i35]Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. IACR Cryptol. ePrint Arch. 2013: 279 (2013) - [i34]Craig Gentry, Amit Sahai, Brent Waters:
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. IACR Cryptol. ePrint Arch. 2013: 340 (2013) - [i33]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2013: 422 (2013) - [i32]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. IACR Cryptol. ePrint Arch. 2013: 451 (2013) - [i31]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-round secure MPC from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2013: 601 (2013) - [i30]Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
How to Compress (Reusable) Garbled Circuits. IACR Cryptol. ePrint Arch. 2013: 687 (2013) - [i29]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. IACR Cryptol. ePrint Arch. 2013: 860 (2013) - 2012
- [c46]Craig Gentry, Shai Halevi, Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit. CRYPTO 2012: 850-867 - [c45]Craig Gentry, Shai Halevi, Nigel P. Smart:
Fully Homomorphic Encryption with Polylog Overhead. EUROCRYPT 2012: 465-482 - [c44]Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:
(Leveled) fully homomorphic encryption without bootstrapping. ITCS 2012: 309-325 - [c43]Craig Gentry, Shai Halevi, Nigel P. Smart:
Better Bootstrapping in Fully Homomorphic Encryption. Public Key Cryptography 2012: 1-16 - [c42]Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart:
Ring Switching in BGV-Style Homomorphic Encryption. SCN 2012: 19-37 - [i28]Craig Gentry, Shai Halevi, Nigel P. Smart:
Homomorphic Evaluation of the AES Circuit. IACR Cryptol. ePrint Arch. 2012: 99 (2012) - [i27]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. IACR Cryptol. ePrint Arch. 2012: 215 (2012) - [i26]Craig Gentry, Shai Halevi, Nigel P. Smart:
Ring Switching in BGV-Style Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2012: 240 (2012) - [i25]Zvika Brakerski, Craig Gentry, Shai Halevi:
Packed Ciphertexts in LWE-based Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2012: 565 (2012) - [i24]Sanjam Garg, Craig Gentry, Shai Halevi:
Candidate Multilinear Maps from Ideal Lattices and Applications. IACR Cryptol. ePrint Arch. 2012: 610 (2012) - [i23]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Sampling Discrete Gaussians Efficiently and Obliviously. IACR Cryptol. ePrint Arch. 2012: 714 (2012) - 2011
- [c41]Craig Gentry, Shai Halevi:
Implementing Gentry's Fully-Homomorphic Encryption Scheme. EUROCRYPT 2011: 129-148 - [c40]Craig Gentry, Shai Halevi:
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits. FOCS 2011: 107-109 - [c39]Craig Gentry, Daniel Wichs:
Separating succinct non-interactive arguments from all falsifiable assumptions. STOC 2011: 99-108 - [i22]Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:
Fully Homomorphic Encryption without Bootstrapping. Electron. Colloquium Comput. Complex. TR11 (2011) - [i21]Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:
Fully Homomorphic Encryption without Bootstrapping. IACR Cryptol. ePrint Arch. 2011: 277 (2011) - [i20]Craig Gentry, Shai Halevi:
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2011: 279 (2011) - [i19]Craig Gentry, Shai Halevi, Nigel P. Smart:
Fully Homomorphic Encryption with Polylog Overhead. IACR Cryptol. ePrint Arch. 2011: 566 (2011) - [i18]Craig Gentry, Shai Halevi, Nigel P. Smart:
Better Bootstrapping in Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 680 (2011) - 2010
- [j4]Craig Gentry:
Computing arbitrary functions of encrypted data. Commun. ACM 53(3): 97-105 (2010) - [c38]Craig Gentry:
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness. CRYPTO 2010: 116-137 - [c37]Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. CRYPTO 2010: 155-172 - [c36]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. CRYPTO 2010: 465-482 - [c35]Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
Fully Homomorphic Encryption over the Integers. EUROCRYPT 2010: 24-43 - [c34]Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
A Simple BGN-Type Cryptosystem from LWE. EUROCRYPT 2010: 506-522 - [p1]Craig Gentry:
The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance. The LLL Algorithm 2010: 391-426 - [i17]Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. IACR Cryptol. ePrint Arch. 2010: 145 (2010) - [i16]Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
A Simple BGN-type Cryptosystem from LWE. IACR Cryptol. ePrint Arch. 2010: 182 (2010) - [i15]Craig Gentry, Shai Halevi:
Implementing Gentry's Fully-Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2010: 520 (2010) - [i14]Craig Gentry, Daniel Wichs:
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions. IACR Cryptol. ePrint Arch. 2010: 610 (2010)
2000 – 2009
- 2009
- [b1]Craig Gentry:
A fully homomorphic encryption scheme. Stanford University, USA, 2009 - [c33]Craig Gentry:
Computing on Encrypted Data. CANS 2009: 477 - [c32]Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz:
Attacking cryptographic schemes based on "perturbation polynomials". CCS 2009: 1-10 - [c31]Craig Gentry, Brent Waters:
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). EUROCRYPT 2009: 171-188 - [c30]Craig Gentry:
Fully homomorphic encryption using ideal lattices. STOC 2009: 169-178 - [c29]Craig Gentry, Shai Halevi:
Hierarchical Identity Based Encryption with Polynomially Many Levels. TCC 2009: 437-456 - [i13]Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz:
Attacking Cryptographic Schemes Based on "Perturbation Polynomials". IACR Cryptol. ePrint Arch. 2009: 98 (2009) - [i12]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. IACR Cryptol. ePrint Arch. 2009: 547 (2009) - [i11]Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2009: 616 (2009) - 2008
- [j3]Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
New Multiparty Signature Schemes for Network Routing Applications. ACM Trans. Inf. Syst. Secur. 12(1): 3:1-3:39 (2008) - [c28]Craig Gentry, Chris Peikert, Vinod Vaikuntanathan:
Trapdoors for hard lattices and new cryptographic constructions. STOC 2008: 197-206 - [i10]Craig Gentry, Brent Waters:
Adaptive Security in Broadcast Encryption Systems. IACR Cryptol. ePrint Arch. 2008: 268 (2008) - [i9]Craig Gentry, Shai Halevi:
Hierarchical Identity Based Encryption with Polynomially Many Levels. IACR Cryptol. ePrint Arch. 2008: 383 (2008) - 2007
- [c27]Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. CCS 2007: 276-285 - [c26]Dan Boneh, Craig Gentry, Michael Hamburg:
Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657 - [i8]