Author of the publication

Better Security for Functional Encryption for Inner Product Evaluations.

, , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FHE Circuit Privacy Almost for Free., , , and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 62-89. Springer, (2016)Fast Homomorphic Evaluation of Deep Discretized Neural Networks., , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 483-512. Springer, (2018)From Rational Number Reconstruction to Set Reconciliation and File Synchronization., , , , , and . TGC, volume 8191 of Lecture Notes in Computer Science, page 1-18. Springer, (2012)Balanced graph edge partition., , and . KDD, page 1456-1465. ACM, (2014)Divisible E-Cash from Constrained Pseudo-Random Functions., , and . ASIACRYPT (1), volume 11921 of Lecture Notes in Computer Science, page 679-708. Springer, (2019)Improved Secure Integer Comparison via Homomorphic Encryption., , and . IACR Cryptology ePrint Archive, (2019)Simple Functional Encryption Schemes for Inner Products., , , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 733-751. Springer, (2015)Better Security for Functional Encryption for Inner Product Evaluations., , , and . IACR Cryptology ePrint Archive, (2016)Fast Homomorphic Evaluation of Deep Discretized Neural Networks., , , and . IACR Cryptology ePrint Archive, (2017)Divisible E-Cash from Constrained Pseudo-Random Functions., and . IACR Cryptology ePrint Archive, (2019)