نتایج جستجو برای: somewhat continuous

تعداد نتایج: 298328  

2015
Massimo Chenal Qiang Tang

A key recovery attack allows an attacker to recover the private key of an underlying encryption scheme when given a number of decryption oracle accesses. Previous research has shown that most existing Somewhat Homomorphic Encryption (SHE) schemes suffer from this attack. In this paper, we propose efficient key recovery attacks against two NTRU-based SHE schemes, which have not gained much atten...

Journal: :Journal of choice modelling 2021

This paper develops analytic results for marginal compensated effects in discrete labor supply models, including a Slutsky equation. The equation is aggregate the sense that it establishes relationship between of probability working and mean hours work terms corresponding uncompensated effects. differs somewhat from standard continuous models. Specifically, effect an increase wage rate decrease...

Journal: :IACR Cryptology ePrint Archive 2008
Juan A. Garay Daniel Wichs Hong-Sheng Zhou

Designing efficient cryptographic protocols tolerating adaptive adversaries, who are able to corrupt parties on the fly as the computation proceeds, has been an elusive task. In this paper we make progress in this area. First, we introduce a new notion called semi-adaptive security which is slightly stronger than static security but significantly weaker than fully adaptive security. The main di...

2015
Anamaria Costache Nigel P. Smart

The purpose of this paper is to compare side-by-side the NTRU and BGV schemes in their non-scale invariant (messages in the lower bits), and their scale invariant (message in the upper bits) forms. The scale invariant versions are often called the FV and YASHE schemes. As an additional optimization, we also investigate the affect of modulus reduction on the scale-invariant schemes. We compare t...

Journal: :IACR Cryptology ePrint Archive 2015
Sujoy Sinha Roy Kimmo Järvinen Frederik Vercauteren Vassil S. Dimitrov Ingrid Verbauwhede

We present a hardware architecture for all building blocks required in polynomial ring based fully homomorphic schemes and use it to instantiate the somewhat homomorphic encryption scheme YASHE. Our implementation is the first FPGA implementation that is designed for evaluating functions on homomorphically encrypted data (up to a certain multiplicative depth) and we illustrate this capability b...

2011
Ryo Hiromasa Yoshifumi Manabe

We propose distributed decryption schemes for somewhat homomorphic encryption (SHE). The proposed schemes are constructed based on the encryption scheme by Brakerski and Vaikuntanathan. In SHE, homomorphic multiplication increases the number of elements in a ciphertext. The proposed scheme can decrypt a ciphertext containing more than two elements with k out of N parties. The distributed decryp...

Journal: :IACR Cryptology ePrint Archive 2014
Massimo Chenal Qiang Tang

In his seminal paper at STOC 2009, Gentry left it as a future work to investigate (somewhat) homomorphic encryption schemes with IND-CCA1 security. At SAC 2011, Loftus et al. showed an IND-CCA1 attack against the somewhat homomorphic encryption scheme presented by Gentry and Halevi at Eurocrypt 2011. At ISPEC 2012, Zhang, Plantard and Susilo showed an IND-CCA1 attack against the somewhat homomo...

2007
Douglas L. T. Rohde

The notion of our common ancestors has received considerable attention of late in both the scientific and lay communities. Principally this attention has focused on ‘Mitochondrial Eve,’ defined to be the woman who lies at the confluence of our maternal ancestry lines, and who is believed to have lived 100,000–200,000 years ago. More recent attention has been given to our common paternal ancesto...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید