Craig Gentry (b. /73) is an American computer scientist. He is best known for his work in cryptography, specifically fully homomorphic encryption. In Fully Homomorphic Encryption Using Ideal Lattices. Craig Gentry. Stanford University and IBM Watson [email protected] ABSTRACT. List of computer science publications by Craig Gentry. (Leveled) fully homomorphic encryption without bootstrapping. ITCS [c43]. view.
|Published (Last):||26 April 2017|
|PDF File Size:||11.13 Mb|
|ePub File Size:||14.46 Mb|
|Price:||Free* [*Free Regsitration Required]|
dblp: Craig Gentry
Craig GentryDaniel Wichs: Craig GentryCharanjit S. Security Protocols Workshop Candidate Multilinear Maps from Ideal Lattices.
Hiding secrets in software: The Case of Logistic Regression. The NSA cited this as a reason hoomorphic begin transitioning to lattice-based cryptosystems, or to other “post-quantum” cryptosystems.
Structure and Randomness in Encrypted Computation. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Craig Gentry’s PhD Thesis
LewkoBrent Waters: Obfuscation Using Tensor Products. GoldmanShai HaleviCharanjit S. End-to-end security in the presence of intelligent data adapting proxies: Unlike FHE, cryptographic multilinear cralg and cryptographic program obfuscation are currently too slow to be feasibly implemented and their in security is not well-understood; this remains an active area of theoretical research.
Password authenticated key exchange using hidden smooth subgroups. LewkoAmit SahaiBrent Waters: The Geometry of Provable Security: Obfuscation using Tensor Products.
How to Compress Reusable Garbled Circuits. IBM Search for people. Adaptive Security in Broadcast Encryptiob Systems. Craig has also worked on verifiable computation VCwhich allows a user to outsource a computation e.
Craig Gentry (computer scientist)
Separating succinct non-interactive arguments from all falsifiable assumptions. FHE allows data processing to be outsourced encfyption. Leveled fully homomorphic encryption without bootstrapping. Better Bootstrapping in Fully Homomorphic Encryption. Zeroizing Without Low-Level Zeroes: Cryptanalyzing multilinear maps without encodings of zero.
Secure Distributed Human Computation. Encrypted Messages from the Heights of Cryptomania.
Craig Gentry’s PhD Thesis
He obtained his Ph. JutlaMariana Raykova: Craig GentryAllison B.
Witness encryption and its applications. Noncommutative Determinant is Hard: IEEE Symposium on Security and Privacy for the “Pinocchio” workEurocrypt for the cryptographic multilinear maps workCrypto for work in lattice-based cryptographyand FOCS for an identity-based encryption scheme. MacKenzieZulfikar Ramzan: