Homomorphic encryption: From private-key to public-key

48Citations
Citations of this article
98Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We show how to transform any additively homomorphic private-key encryption scheme that is compact, into a public-key encryption scheme. By compact we mean that the length of a homomorphically generated encryption is independent of the number of ciphertexts from which it was created. We do not require anything else on the distribution of homomorphically generated encryptions (in particular, we do not require them to be distributed like real ciphertexts). Our resulting public-key scheme is homomorphic in the following sense. If the private-key scheme is i+1-hop homomorphic with respect to some set of operations then the public-key scheme we construct is i-hop homomorphic with respect to the same set of operations. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Rothblum, R. (2011). Homomorphic encryption: From private-key to public-key. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6597 LNCS, pp. 219–234). Springer Verlag. https://doi.org/10.1007/978-3-642-19571-6_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free