ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Optimized relinearization algorithm of the multikey homomorphic encryption scheme
Tsinghua Science & Technology
◽
10.26599/tst.2021.9010047
◽
2022
◽
Vol 27
(3)
◽
pp. 642-652
Author(s):
Xiaoyuan Yang
◽
Shangwen Zheng
◽
Tanping Zhou
◽
Yao Liu
◽
Xiaoliang Che
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
Download Full-text
Related Documents
Cited By
References
Low Size Cipher Text Homomorphic Encryption Scheme for Cloud Data
International Journal of Private Cloud Computing Environment and Management
◽
10.21742/ijpccem.2017.4.1.02
◽
2017
◽
Vol 4
(1)
◽
pp. 13-20
Author(s):
Manish M. Potey
◽
◽
C. A. Dhote
◽
Deepak H. Sharma
◽
◽
...
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Cloud Data
◽
Cipher Text
Download Full-text
Fully homomorphic encryption scheme on a nonCommutative ring R
2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)
◽
10.1109/isacs48493.2019.9068892
◽
2019
◽
Author(s):
Mustapha Elhassani
◽
Aziz Boulbot
◽
Abdelhakim Chillali
◽
Ali Mouhib
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Noncommutative Ring
◽
Fully Homomorphic Encryption
Download Full-text
A Somewhat Homomorphic Encryption Scheme based on Multivariate Polynomial Evaluation
2019 29th International Conference Radioelektronika (RADIOELEKTRONIKA)
◽
10.1109/radioelek.2019.8733575
◽
2019
◽
Cited By ~ 1
Author(s):
Uddipana Dowerah
◽
Srinivasan Krishnaswamy
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Multivariate Polynomial
◽
Polynomial Evaluation
◽
Somewhat Homomorphic Encryption
Download Full-text
A Verifiable Fully Homomorphic Encryption Scheme
Security, Privacy, and Anonymity in Computation, Communication, and Storage - Lecture Notes in Computer Science
◽
10.1007/978-3-030-24907-6_31
◽
2019
◽
pp. 412-426
◽
Cited By ~ 1
Author(s):
Ruwei Huang
◽
Zhikun Li
◽
Jianan Zhao
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Fully Homomorphic Encryption
Download Full-text
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
Theoretical Computer Science
◽
10.1016/j.tcs.2015.10.001
◽
2016
◽
Vol 609
◽
pp. 253-261
◽
Cited By ~ 2
Author(s):
Linming Gong
◽
Shundong Li
◽
Qing Mao
◽
Daoshun Wang
◽
Jiawei Dou
Keyword(s):
Homomorphic Encryption
◽
Random Oracle
◽
Encryption Scheme
◽
Chosen Ciphertext Security
◽
Adaptive Chosen Ciphertext Security
Download Full-text
A (Leveled) fully homomorphic encryption scheme based on error-free approximate GCD
2015 IEEE 5th International Conference on Electronics Information and Emergency Communication
◽
10.1109/iceiec.2015.7284526
◽
2015
◽
Author(s):
Xing Li
◽
Jianping Yu
◽
Peng Zhang
◽
Xiaoqiang Sun
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Fully Homomorphic Encryption
◽
Approximate Gcd
Download Full-text
Low Noise Homomorphic Encryption Scheme Supporting Multi-Bit Encryption
10.1109/ccns53852.2021.00036
◽
2021
◽
Author(s):
Guangli Xiang
◽
Can Shao
Keyword(s):
Homomorphic Encryption
◽
Low Noise
◽
Encryption Scheme
Download Full-text
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation
Designs Codes and Cryptography
◽
10.1007/s10623-021-00993-2
◽
2022
◽
Author(s):
Jiang Liu
◽
Qin Li
◽
Junyu Quan
◽
Can Wang
◽
Jinjing Shi
◽
...
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
Download Full-text
Symmetric Fully Homomorphic Encryption Scheme with Polynomials Operations
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
◽
10.1109/iceca.2018.8474729
◽
2018
◽
Author(s):
Kavita Aganya
◽
Iti Sharma
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Fully Homomorphic Encryption
Download Full-text
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-642-45239-0_4
◽
2013
◽
pp. 45-64
◽
Cited By ~ 148
Author(s):
Joppe W. Bos
◽
Kristin Lauter
◽
Jake Loftus
◽
Michael Naehrig
Keyword(s):
Homomorphic Encryption
◽
Encryption Scheme
◽
Fully Homomorphic Encryption
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close