Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
- 1 January 2012
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- Vol. 2011, 296-312
- https://doi.org/10.1007/978-3-642-27954-6_19
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationLecture Notes in Computer Science, 2012
- Verifiable Delegation of Computation over Large DatasetsLecture Notes in Computer Science, 2011
- Functional Encryption: Definitions and ChallengesLecture Notes in Computer Science, 2011
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product EncryptionLecture Notes in Computer Science, 2010
- Improved Delegation of Computation Using Fully Homomorphic EncryptionLecture Notes in Computer Science, 2010
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted WorkersLecture Notes in Computer Science, 2010
- Fully Secure Functional Encryption with General Relations from the Decisional Linear AssumptionLecture Notes in Computer Science, 2010
- Fully homomorphic encryption using ideal latticesPublished by Association for Computing Machinery (ACM) ,2009
- Predicate Privacy in Encryption SystemsLecture Notes in Computer Science, 2009
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner ProductsPublished by Springer Science and Business Media LLC ,2008