Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Gentry, Craig Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  (Leveled) fully homomorphic encryption without bootstrapping
Brakerski Z., Gentry C., Vaikuntanathan V. ACM Transactions on Computation Theory 6(3): Article No. 13, 2014.  Type: Article

If you work with large amounts of data being hosted on public clouds, homomorphic encryption (HE) is an extremely innovative idea to add security layers to your data while it is being hosted and processed on third-party servers. Basica...
...
Jul 24 2015  
  Pinocchio: nearly practical verifiable computation
Parno B., Howell J., Gentry C., Raykova M.  SP 2013 (Proceedings of the 2013 IEEE Symposium on Security and Privacy,May 19-22, 2013) 238-252, 2013.  Type: Proceedings

Verifiable computation promises to improve the confidence of users when they choose cloud or outsourced computing to save money rather than maintaining their own servers and retaining the related technical support staff. The existing v...
...
Oct 23 2013  
  Computing arbitrary functions of encrypted data
Gentry C. Communications of the ACM 53(3): 97-105, 2010.  Type: Article

Is it possible to delegate the ability to process your data without giving away access to it?...
...
May 26 2011  
  New multiparty signature schemes for network routing applications
Boldyreva A., Gentry C., O’Neill A., Yum D. ACM Transactions on Information and System Security 12(1): 1-39, 2008.  Type: Article

Every day, the Internet links millions of people worldwide to vast amounts of information. Although there exist solutions for a widespread forgery attack on two threshold group signature schemes with secret signers [1], data packet tra...
...
Mar 26 2010  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy