International audienceWe continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits an input x into shares (x0,x1) such that (1) each share computationally hides x, and (2) there exists an efficient homomorphic evaluation algorithm $\Eval$ such that for any function (or "program") from a given class it holds that Eval(x0,P)+Eval(x1,P)=P(x). Boyle et al. show how to construct an HSS scheme for branching programs, with an inverse polynomial error, using discrete-log type assumptions such as DDH.We make two types of contributions.Optimizations. We introduce new optimizations that speed up the previous optimized implementation of Boyle et al. by more t...
Abstract. Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryp...
Abstract. We initiate the study of good rate homomorphic encryption schemes. Based on previous work ...
Preface Homomorphic encryption is a form of encryption that allows specific types of computations to...
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Cryp...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
Homomorphic secret sharing (HSS) is a form of secret sharing that supports the local evaluation of f...
This thesis focuses on constructions of Homomorphic Secret Sharing (HSS) based on assumptions not kn...
We present the first homomorphic secret sharing (HSS) construction that simultaneously (1) has negli...
A homomorphic secret sharing (HSS) scheme is a secret sharing scheme that supports evaluating functi...
We propose and analyze a simple strategy for constructing 1-key constrained pseudorandom functions (...
Over the past few years, homomorphic secret sharing (HSS) emerged as a compelling alternative to ful...
Fully homomorphic encryption (FHE) is a class of encryption algorithms that support any computation ...
In this paper, we explore the multi-server (i.e., multiple servers are employed to perform computati...
Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has b...
Abstract. Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryp...
Abstract. We initiate the study of good rate homomorphic encryption schemes. Based on previous work ...
Preface Homomorphic encryption is a form of encryption that allows specific types of computations to...
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Cryp...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS sc...
Homomorphic secret sharing (HSS) is a form of secret sharing that supports the local evaluation of f...
This thesis focuses on constructions of Homomorphic Secret Sharing (HSS) based on assumptions not kn...
We present the first homomorphic secret sharing (HSS) construction that simultaneously (1) has negli...
A homomorphic secret sharing (HSS) scheme is a secret sharing scheme that supports evaluating functi...
We propose and analyze a simple strategy for constructing 1-key constrained pseudorandom functions (...
Over the past few years, homomorphic secret sharing (HSS) emerged as a compelling alternative to ful...
Fully homomorphic encryption (FHE) is a class of encryption algorithms that support any computation ...
In this paper, we explore the multi-server (i.e., multiple servers are employed to perform computati...
Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has b...
Abstract. Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryp...
Abstract. We initiate the study of good rate homomorphic encryption schemes. Based on previous work ...
Preface Homomorphic encryption is a form of encryption that allows specific types of computations to...