Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
38
views
53
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,834
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
E-Voting and Identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
Private Constrained PRFs (and More) from LWE
other
Author(s):
Zvika Brakerski
,
Rotem Tsabary
,
Vinod Vaikuntanathan
,
Hoeteck Wee
Publication date
(Online):
November 05 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
53
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Fully homomorphic encryption using ideal lattices
Craig Gentry
(2009)
0
comments
Cited
163
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
(Leveled) fully homomorphic encryption without bootstrapping
Vinod Vaikuntanathan
,
Zvika Brakerski
,
Craig Gentry
(2012)
0
comments
Cited
124
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Attribute-based encryption for fine-grained access control of encrypted data
Brent Waters
,
Vipul Goyal
,
Omkant Pandey
…
(2006)
0
comments
Cited
113
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
November 05 2017
Pages
: 264-302
DOI:
10.1007/978-3-319-70500-2_10
SO-VID:
339a7495-8bb5-4022-912f-1b955c0079e6
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 264
Private Constrained PRFs (and More) from LWE
pp. 137
Simulation-Based Analysis of E2E Voting Systems
Similar content
1,834
Constraint-Hiding Constrained PRFs for NC \(^1\) from LWE
Authors:
Ran Canetti
,
Yilei Chen
Characterization of Susceptibility Artifacts in MR-thermometry PRFS-based during Laser Interstitial Thermal Therapy
Authors:
Martina Landro
,
Céline Giraudeau
,
Juan Verde
…
A (t,n)‐secret image sharing with steganography based on Rook polynomial and LWE problem
Authors:
S MASHHADI
See all similar
Cited by
3
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation
Authors:
Shweta Agrawal
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Authors:
Yilei Chen
,
Vinod Vaikuntanathan
,
Hoeteck Wee
Constrained PRFs for \(\mathrm{NC}^1\) in Traditional Groups
Authors:
Nuttapong Attrapadung
,
Takahiro Matsuda
,
Ryo Nishimaki
…
See all cited by