Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,345 papers from all fields of science
Search
Sign In
Create Free Account
Homomorphic encryption
Known as:
Fully homomorphic encryption
, Homomorphic computing
, Privacy homomorphism
Homomorphic encryption is a form of encryption that allows computations to be carried out on ciphertext, thus generating an encrypted result which…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
Ciphertext
Client-side encryption
Cloud computing
Cloud computing security
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
L. T. Phong
,
Yoshinori Aono
,
Takuya Hayashi
,
Lihua Wang
,
S. Moriai
IEEE Transactions on Information Forensics and…
2018
Corpus ID: 289366
We present a privacy-preserving deep learning system in which many learning participants perform neural network-based deep…
Expand
Highly Cited
2017
Highly Cited
2017
Homomorphic Encryption for Arithmetic of Approximate Numbers
J. Cheon
,
Andrey Kim
,
Miran Kim
,
Yongsoo Song
International Conference on the Theory and…
2017
Corpus ID: 3164123
We suggest a method to construct a homomorphic encryption scheme for approximate arithmetic. It supports an approximate addition…
Expand
Highly Cited
2011
Highly Cited
2011
Efficient Fully Homomorphic Encryption from (Standard) LWE
Zvika Brakerski
,
V. Vaikuntanathan
IEEE Annual Symposium on Foundations of Computer…
2011
Corpus ID: 149260
We present a fully homomorphic encryption scheme that is based solely on the(standard) learning with errors (LWE) assumption…
Expand
Highly Cited
2011
Highly Cited
2011
Implementing Gentry's Fully-Homomorphic Encryption Scheme
Craig Gentry
,
S. Halevi
International Conference on the Theory and…
2011
Corpus ID: 686266
We describe a working implementation of a variant of Gentry's fully homomorphic encryption scheme (STOC 2009), similar to the…
Expand
Highly Cited
2011
Highly Cited
2011
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
Zvika Brakerski
,
V. Vaikuntanathan
Annual International Cryptology Conference
2011
Corpus ID: 11312215
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security…
Expand
Highly Cited
2011
Highly Cited
2011
Can homomorphic encryption be practical?
K. Lauter
,
M. Naehrig
,
V. Vaikuntanathan
Cloud Computing Security Workshop
2011
Corpus ID: 12274859
The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy…
Expand
Highly Cited
2010
Highly Cited
2010
Fully Homomorphic Encryption over the Integers
Marten van Dijk
,
Craig Gentry
,
S. Halevi
,
V. Vaikuntanathan
International Conference on the Theory and…
2010
Corpus ID: 5627147
We construct a simple fully homomorphic encryption scheme, using only elementary modular arithmetic. We use Gentry’s technique to…
Expand
Highly Cited
2010
Highly Cited
2010
Secure Information Aggregation for Smart Grids Using Homomorphic Encryption
Fengjun Li
,
Bo Luo
,
Peng Liu
First IEEE International Conference on Smart Grid…
2010
Corpus ID: 5071237
In this paper, we present a distributed incremental data aggregation approach, in which data aggregation is performed at all…
Expand
Highly Cited
2009
Highly Cited
2009
Fully homomorphic encryption using ideal lattices
Craig Gentry
Symposium on the Theory of Computing
2009
Corpus ID: 947660
We propose a fully homomorphic encryption scheme -- i.e., a scheme that allows one to evaluate circuits over encrypted data…
Expand
Highly Cited
2009
Highly Cited
2009
A fully homomorphic encryption scheme
Craig Gentry
2009
Corpus ID: 53903759
We propose the first fully homomorphic encryption scheme, solving an old open problem. Such a scheme allows one to compute…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE