Craig Gentry (b. /73) is an American computer scientist. He is best known for his work in cryptography, specifically fully homomorphic encryption. In Fully Homomorphic Encryption Using Ideal Lattices. Craig Gentry. Stanford University and IBM Watson [email protected] ABSTRACT. List of computer science publications by Craig Gentry. (Leveled) fully homomorphic encryption without bootstrapping. ITCS [c43]. view.

Author: Zulurn Kagakora
Country: Iran
Language: English (Spanish)
Genre: Marketing
Published (Last): 26 April 2017
Pages: 165
PDF File Size: 11.13 Mb
ePub File Size: 14.46 Mb
ISBN: 499-7-12405-848-6
Downloads: 7531
Price: Free* [*Free Regsitration Required]
Uploader: Shaktisida

dblp: Craig Gentry

Craig GentryDaniel Wichs: Craig GentryCharanjit S. Security Protocols Workshop Candidate Multilinear Maps from Ideal Lattices.

Hiding secrets in software: The Case of Logistic Regression. The NSA cited this as a reason hoomorphic begin transitioning to lattice-based cryptosystems, or to other “post-quantum” cryptosystems.

Structure and Randomness in Encrypted Computation. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.

  CMS L564 PDF

Craig Gentry’s PhD Thesis

LewkoBrent Waters: Obfuscation Using Tensor Products. GoldmanShai HaleviCharanjit S. End-to-end security in the presence of intelligent data adapting proxies: Unlike FHE, cryptographic multilinear cralg and cryptographic program obfuscation are currently too slow to be feasibly implemented and their in security is not well-understood; this remains an active area of theoretical research.

Password authenticated key exchange using hidden smooth subgroups. LewkoAmit SahaiBrent Waters: The Geometry of Provable Security: Obfuscation using Tensor Products.

How to Compress Reusable Garbled Circuits. IBM Search for people. Adaptive Security in Broadcast Encryptiob Systems. Craig has also worked on verifiable computation VCwhich allows a user to outsource a computation e.

Craig Gentry (computer scientist)

Separating succinct non-interactive arguments from all falsifiable assumptions. FHE allows data processing to be outsourced encfyption. Leveled fully homomorphic encryption without bootstrapping. Better Bootstrapping in Fully Homomorphic Encryption. Zeroizing Without Low-Level Zeroes: Cryptanalyzing multilinear maps without encodings of zero.

Secure Distributed Human Computation. Encrypted Messages from the Heights of Cryptomania.


Craig Gentry’s PhD Thesis

He obtained his Ph. JutlaMariana Raykova: Craig GentryAllison B.

Witness encryption and its applications. Noncommutative Determinant is Hard: IEEE Symposium on Security and Privacy for the “Pinocchio” workEurocrypt for the cryptographic multilinear maps workCrypto for work in lattice-based cryptographyand FOCS for an identity-based encryption scheme. MacKenzieZulfikar Ramzan: