Craig Gentry (b. /73) is an American computer scientist. He is best known for his work in cryptography, specifically fully homomorphic encryption. In Fully Homomorphic Encryption Using Ideal Lattices. Craig Gentry. Stanford University and IBM Watson [email protected] ABSTRACT. List of computer science publications by Craig Gentry. (Leveled) fully homomorphic encryption without bootstrapping. ITCS [c43]. view.

Author: Tojahn Mooguzshura
Country: Niger
Language: English (Spanish)
Genre: Software
Published (Last): 3 January 2008
Pages: 409
PDF File Size: 4.62 Mb
ePub File Size: 20.27 Mb
ISBN: 239-2-95909-574-2
Downloads: 55294
Price: Free* [*Free Regsitration Required]
Uploader: Dataxe

Public Key Cryptography 2 Trapdoors for hard lattices and new cryptographic constructions. Cryptanalyses of Candidate Branching Program Obfuscators. The Geometry of Provable Security: Public Key Cryptography GoldmanShai EncrypttionCharanjit S.

Noncommutative Determinant is Hard: Computing on the edge of chaos: Much of Craig’s recent work, including FHE and cryptographic multilinear maps, generally falls into the area of “lattice-based cryptography”.

This led to the construction of the first cryptographic program obfuscation schemes with Shai, Sanjam, Mariana Raykova, Amit Sahai, and Brent Watersa major breakthrough that had been thought to be impossible. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.

TOP Related Posts  M35080 PROGRAMMER PDF

Craig Gentry (computer scientist) – Wikipedia

Hiding secrets in software: Sampling Discrete Gaussians Efficiently and Obliviously. Candidate Multilinear Maps from Ideal Lattices. Attacking cryptographic schemes based on “perturbation polynomials”.

Journal of Computer Security 21 5: Computing arbitrary functions of encrypted data.

Craig GentryKenny A. Leveled Fully Homomorphic Encryption without Bootstrapping. Outsourcing Computation to Untrusted Workers. The Case of Logistic Regression.

Craig Gentry (computer scientist)

Craig has genhry worked on verifiable computation VCwhich allows a user to outsource a computation e. MacKenzieZulfikar Ramzan: He obtained his Ph.

LewkoBrent Waters: Obfuscation using Encryptioon Products. InCraig with Shai and Sanjam Garg, then a postdoc at IBM also constructed the first cryptographic multilinear map scheme, a cryptographic tool that is in some ways even more powerful than FHE. Adaptive Security in Broadcast Encryption Systems.

Fully Homomorphic Encryption over the Integers. Zeroizing Without Low-Level Zeroes: Privacy Enhancing Technologies Structure and encryptiln in encrypted computation.

Leveled fully homomorphic encryption without bootstrapping. Structure and Randomness in Encrypted Computation. Secure distributed human computation. End-to-end security in the presence of intelligent data adapting proxies: MajiAmit Sahai: JutlaMariana RaykovaDaniel Wichs: