{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:29:48Z","timestamp":1774448988820,"version":"3.50.1"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2010,3]]},"abstract":"<jats:p>\n            Suppose that you want to delegate the ability to\n            <jats:italic>process<\/jats:italic>\n            your data, without giving away\n            <jats:italic>access<\/jats:italic>\n            to it. We show that this separation is possible: we describe a \"fully homomorphic\" encryption scheme that keeps data private, but that allows a worker that\n            <jats:italic>does not have the secret decryption key<\/jats:italic>\n            to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy.\n          <\/jats:p>","DOI":"10.1145\/1666420.1666444","type":"journal-article","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T19:20:32Z","timestamp":1267557632000},"page":"97-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":453,"title":["Computing arbitrary functions of encrypted data"],"prefix":"10.1145","volume":"53","author":[{"given":"Craig","family":"Gentry","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2010,3]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"CRYPT","author":"Boneh D.","year":"1996"},{"key":"e_1_2_1_2_1","volume-title":"Stanford University","author":"Gentry C.","year":"2009"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_2_1_5_1","volume-title":"Foundations of Secure Computations","author":"Rivest R.L.","year":"1978"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_7_1","unstructured":"Smart N.P. Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes 2009. http:\/\/eprint.iacr.org\/2009\/571.  Smart N.P. Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes 2009. http:\/\/eprint.iacr.org\/2009\/571."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/S009753970343141X"},{"key":"e_1_2_1_9_1","unstructured":"van Dijk M. Gentry C. Halevi S. Vaikuntanathan V. Fully homomorphic encryption over the integers 2009. http:\/\/eprint.iacr.org\/2009\/616.  van Dijk M. Gentry C. Halevi S. Vaikuntanathan V. Fully homomorphic encryption over the integers 2009. http:\/\/eprint.iacr.org\/2009\/616."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1666420.1666444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1666420.1666444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:29Z","timestamp":1750250489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1666420.1666444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["10.1145\/1666420.1666444"],"URL":"https:\/\/doi.org\/10.1145\/1666420.1666444","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3]]},"assertion":[{"value":"2010-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}