Craig Gentry (b. /73) is an American computer scientist. He is best known for his work in cryptography, specifically fully homomorphic encryption. In Fully Homomorphic Encryption Using Ideal Lattices. Craig Gentry. Stanford University and IBM Watson [email protected] ABSTRACT. List of computer science publications by Craig Gentry. (Leveled) fully homomorphic encryption without bootstrapping. ITCS [c43]. view.
|Published (Last):||14 December 2010|
|PDF File Size:||7.90 Mb|
|ePub File Size:||1.59 Mb|
|Price:||Free* [*Free Regsitration Required]|
Secure distributed human computation.
Craig Gentry’s PhD Thesis
Craig GentryShai Halevi: LewkoAmit SahaiEncrypgion Waters: FHE allows data processing to be outsourced e. Nearly Practical Verifiable Computation.
Computing arbitrary functions of encrypted data. Functional Encryption Without Obfuscation.
Craig Gentry (computer scientist)
Craig GentryDaniel Hpmomorphic The LLL Algorithm Journal of Computer Security 21 5: Homomorphic Encryption from Learning with Errors: LewkoBrent Waters: Cryptanalyses of Candidate Branching Program Obfuscators.
Much of Craig’s recent work, including FHE and cryptographic multilinear maps, generally falls into the area of “lattice-based cryptography”. Craig GentryPhilip D. Hiding secrets in software: Fully Homomorphic Encryption without Bootstrapping.
Craaig Multilinear Maps from Ideal Lattices. JutlaMariana Raykova: The Geometry of Provable Security: Separating succinct non-interactive arguments from all falsifiable assumptions. Unlike FHE, cryptographic multilinear maps and cryptographic program obfuscation are currently too slow to be feasibly implemented and their in security is not well-understood; this remains an active area of theoretical research. Unlike commonly-used cryptosystems like RSA and elliptic-curve cryptography, lattice-based cryptosystems cannot feasibly as far as we know be broken by quantum computers.
Craig Gentry (computer scientist) – Wikipedia
Fully Homomorphic Encryption over the Integers. Better Bootstrapping in Fully Homomorphic Encryption. MajiAmit Sahai: Witness Encryption and its Applications.
Craig GentryCharanjit S. Secure Distributed Human Computation. Zeroizing Without Low-Level Zeroes: Structure and Randomness in Encrypted Computation. Witness encryption and its homomorpyic.
Craig B. Gentry – IBM
MacKenzieZulfikar Ramzan: The Case of Logistic Regression. Trapdoors for hard lattices and new cryptographic constructions. Leveled Fully Homomorphic Encryption without Bootstrapping. Obfuscation Using Tensor Products.
Computing on Encrypted Data. Craig GentryAllison B. GoldmanShai HaleviCharanjit S.
Sampling Discrete Gaussians Efficiently and Obliviously. Outsourcing Computation to Untrusted Workers.
Fully homomorphic encryption using ideal lattices. Privacy Enhancing Technologies Leveled fully homomorphic encryption without bootstrapping. Witness Encryption from Instance Independent Assumptions.
IBM Search for people.