Cryptanalysis of factoring-based fully homomorphic encryption
Abstract
References
Index Terms
- Cryptanalysis of factoring-based fully homomorphic encryption
Recommendations
Cryptanalysis of Threshold Proxy Signature Scheme Based on Factoring
ISISE '08: Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01All of the existing threshold signature schemes cannot withstand conspiracy attacks. Its reason is that the secret of any subgroup shares is the group secret key, and any t or more group members can cooperate to reveal the group secret key with high ...
Cryptanalysis of the RCES/RSES image encryption scheme
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen ...
Bootstrappable Identity-Based Fully Homomorphic Encryption
Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813It has been an open problem for a number of years to construct an identity-based fully homomorphic encryption IBFHE scheme first mentioned by Naccache at CHES/CRYPTO 2010. At CRYPTO 2013, Gentry, Sahai and Waters largely settled the problem by ...
Comments
Information & Contributors
Information
Published In
- Conference Chairs:
- Oleg Makarevich,
- Ron Poet,
- Atilla Elçi,
- Manoj Singh Gaur,
- Mehmet Orgun,
- Program Chairs:
- Ludmila Babenko,
- Sadek Ferdous,
- Anthony T. S. Ho,
- Vijay Laxmi,
- Josef Pieprzyk
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 152Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in