International audienceIn 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, enhancing the poor expansion factor provided by Goldwasser and Micali's scheme. Since then, numerous papers have taken advantage of Benaloh's homomorphic encryption function, including voting schemes, private multi-party trust computation, non-interactive verifiable secret sharing, online poker. In this paper we show that the original description of the scheme is incorrect, because it can result in ambiguous decryption of ciphertexts. Then we show on several applications that a bad choice in the key generation phase of Benaloh's scheme has a real impact on the behaviour of the application. For instance in an e-voting protocol, it can inverse ...
This paper offers a mathematical introduction to fully homomorphic encryption, a concept that enable...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
peer reviewedWe present an approach for performing the tallying work in the coercion-resistant JCJ v...
International audienceIn 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, ...
International audienceWe introduce a generic construction principle for homomorphic encryption schem...
We propose a generalisation of Paillier's probabilistic publickey system, in which the expansion fac...
During the last few years homomorphic encryption techniques have been studied extensively since they...
We study various applications and variants of Paillier's probabilistic encryption scheme. First, we ...
International audienceGiven an arbitrary finite nontrivial group, we describe a probabilistic public...
We present the first homomorphic secret sharing (HSS) construction that simultaneously (1) has negli...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
Preface Homomorphic encryption is a form of encryption that allows specific types of computations to...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
peer reviewedIn his seminal paper at STOC 2009, Gentry left it as a future work to investigate (some...
This paper offers a mathematical introduction to fully homomorphic encryption, a concept that enable...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
peer reviewedWe present an approach for performing the tallying work in the coercion-resistant JCJ v...
International audienceIn 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, ...
International audienceWe introduce a generic construction principle for homomorphic encryption schem...
We propose a generalisation of Paillier's probabilistic publickey system, in which the expansion fac...
During the last few years homomorphic encryption techniques have been studied extensively since they...
We study various applications and variants of Paillier's probabilistic encryption scheme. First, we ...
International audienceGiven an arbitrary finite nontrivial group, we describe a probabilistic public...
We present the first homomorphic secret sharing (HSS) construction that simultaneously (1) has negli...
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted i...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
Preface Homomorphic encryption is a form of encryption that allows specific types of computations to...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
peer reviewedIn his seminal paper at STOC 2009, Gentry left it as a future work to investigate (some...
This paper offers a mathematical introduction to fully homomorphic encryption, a concept that enable...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
peer reviewedWe present an approach for performing the tallying work in the coercion-resistant JCJ v...