Implementing gentry's fully-homomorphic encryption scheme

C Gentry, S Halevi - Annual international conference on the theory and …, 2011 - Springer
We describe a working implementation of a variant of Gentry's fully homomorphic encryption
scheme (STOC 2009), similar to the variant used in an earlier implementation effort by Smart …

An information retrieval approach to concept location in source code

A Marcus, A Sergeyev, V Rajlich… - 11th working conference …, 2004 - ieeexplore.ieee.org
Concept location identifies parts of a software system that implement a specific concept that
originates from the problem or the solution domain. Concept location is a very common …

Homomorphic signatures for polynomial functions

D Boneh, DM Freeman - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
We construct the first homomorphic signature scheme that is capable of evaluating
multivariate polynomials on signed data. Given the public key and a signed data set, there is …

Fully secure unbounded inner-product and attribute-based encryption

T Okamoto, K Takashima - International Conference on the Theory and …, 2012 - Springer
In this paper, we present the first inner-product encryption (IPE) schemes that are
unbounded in the sense that the public parameters do not impose additional limitations on …

Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures

D Boneh, DM Freeman - International Workshop on Public Key …, 2011 - Springer
We propose a linearly homomorphic signature scheme that authenticates vector subspaces
of a given ambient space. Our system has several novel properties not found in previous …

Computing on authenticated data

JH Ahn, D Boneh, J Camenisch, S Hohenberger… - Theory of Cryptography …, 2012 - Springer
In tandem with recent progress on computing on encrypted data via fully homomorphic
encryption, we present a framework for computing on authenticated data via the notion of …

Computing on authenticated data: New privacy definitions and constructions

N Attrapadung, B Libert, T Peters - … on the Theory and Application of …, 2012 - Springer
Homomorphic signatures are primitives that allow for public computations on authenticated
data. At TCC 2012, Ahn et al. defined a framework and security notions for such systems. For …

Efficient completely context-hiding quotable and linearly homomorphic signatures

N Attrapadung, B Libert, T Peters - … Conference on Practice and Theory in …, 2013 - Springer
Homomorphic signatures are primitives that allow for public computations for a class of
specified predicates over authenticated data. An enhanced privacy notion, called complete …

Authenticated data sharing with privacy protection and batch verification for healthcare IoT

F Zhu, X Yi, A Abuadbba, I Khalil… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The healthcare Internet of Things (IoT) is rapidly becoming an invaluable tool in the
healthcare industry. However, sharing data in healthcare IoT raises many security and …

Lightweight authentication scheme for data dissemination in cloud-assisted healthcare IoT

J Liu, J Yang, W Wu, X Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recent advancements in the Internet of Things (IoT) and cloud computing technologies have
accelerated the development of various practical applications, including healthcare systems …