
浏览量:413
Shai Halevi
Principal Research Staff Member
IBM T. J. Watson Research Center
Login to view more

论文共 201 篇
Homomorphic Encryption for Finite Automata.
Homomorphic Training of 30, 000 Logistic Regression Models.
Compressible FHE with Applications to PIR.
Round-Optimal Secure Multi-Party Computation.
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.
Faster Homomorphic Linear Transformations in HElib.
Doing Real Work with FHE: The Case of Logistic Regression.
Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation.
Advanced Cryptography: Promise and Challenges.
Best Possible Information-Theoretic MPC.
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free.
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.
Cryptanalyses of Candidate Branching Program Obfuscators.
Implementing BP-Obfuscation Using Graph-Induced Encoding.
Privacy-Preserving Search of Similar Patients in Genomic Data.
Four Round Secure Computation without Setup.
Non-Interactive Multiparty Computation Without Correlated Randomness.
Implementing BP-Obfuscation Using Graph-Induced Encoding.
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Spooky Encryption and its Applications.
Hiding secrets in software: a cryptographic approach to program obfuscation.
Functional Encryption Without Obfuscation.
Secure Multiparty Computation with General Interaction Patterns.
Graph-Induced Multilinear Maps from Lattices.
Private Database Access With HE-over-ORAM Architecture.
Secure Multiparty Computation with General Interaction Patterns.
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations.
Cryptanalysis of the Quadratic Zero-Testing of GGH.
Graded Encoding, Variations on a Scheme.
Outsourcing Private RAM Computation
Graded Multilinear Maps from Lattices.
Fully Secure Functional Encryption without Obfuscation.
Fully Secure Attribute Based Encryption from Multilinear Maps.
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.
Candidate Multilinear Maps from Ideal Lattices.
Two-round secure MPC from Indistinguishability Obfuscation.
Private database queries using somewhat homomorphic encryption
Field switching in BGV-style homomorphic encryption
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Attribute-Based Encryption for Circuits from Multilinear Maps.
How to Compress (Reusable) Garbled Circuits.
Packed Ciphertexts in LWE-based Homomorphic Encryption.
Optimizing ORAM and Using it Efficiently for Secure Computation.
Leakage-Tolerant interactive protocols
Sampling Discrete Gaussians Efficiently and Obliviously.
Homomorphic Evaluation of the AES Circuit.
Ring switching in BGV-Style homomorphic encryption
Fully homomorphic encryption with polylog overhead
Candidate Multilinear Maps from Ideal Lattices and Applications.
Better bootstrapping in fully homomorphic encryption
Fully Homomorphic Encryption with Polylog Overhead
Ring switching in BGV-Style homomorphic encryption
After-the-fact leakage in public-key encryption
Composable security analysis of OS services
Collision-Free Hashing from Lattice Problems.
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
Program obfuscation with leaky hardware
Secure computation on the web: computing without simultaneous interaction
Tree-based HB protocols for privacy-preserving authentication of RFID tags
Implementing Gentry's fully-homomorphic encryption scheme
One-pass HMQV and asymmetric key-wrapping
Proofs of ownership in remote storage systems
i-hop homomorphic encryption and rerandomizable Yao circuits
Fully homomorphic encryption over the integers
A simple BGN-Type cryptosystem from LWE
Attacking cryptographic schemes based on "perturbation polynomials"
Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Hierarchical Identity Based Encryption with Polynomially Many Levels
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
System and method for fuzzy multi-level security
On Seed-Incompressible Functions