{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T14:12:40Z","timestamp":1775830360553,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,1,8]],"date-time":"2012-01-08T00:00:00Z","timestamp":1325980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-11-C-0096FA8750-11-2-0225"],"award-info":[{"award-number":["FA8750-11-C-0096FA8750-11-2-0225"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,1,8]]},"DOI":"10.1145\/2090236.2090262","type":"proceedings-article","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T17:02:17Z","timestamp":1326214937000},"page":"309-325","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1199,"title":["(Leveled) fully homomorphic encryption without bootstrapping"],"prefix":"10.1145","author":[{"given":"Zvika","family":"Brakerski","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Craig","family":"Gentry","sequence":"additional","affiliation":[{"name":"IBM Watson Research Center, Hawthorne, NY"}]},{"given":"Vinod","family":"Vaikuntanathan","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON"}]}],"member":"320","published-online":{"date-parts":[[2012,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_35"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski and Vinod Vaikuntanathan. Efficient fully homomorphic encryption from (standard) lwe. Manuscript to appear in FOCS 2011 available at http:\/\/eprint.iacr.org\/2011\/344.  Zvika Brakerski and Vinod Vaikuntanathan. Efficient fully homomorphic encryption from (standard) lwe. Manuscript to appear in FOCS 2011 available at http:\/\/eprint.iacr.org\/2011\/344.","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski and Vinod Vaikuntanathan. Fully homomorphic encryption from ring-lwe and security for key dependent messages. Manuscript to appear in CRYPTO 2011.   Zvika Brakerski and Vinod Vaikuntanathan. Fully homomorphic encryption from ring-lwe and security for key dependent messages. Manuscript to appear in CRYPTO 2011.","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_3_2_1_5_1","unstructured":"Jean-S\u00e9bastien Coron Avradip Mandal David Naccache and Mehdi Tibouchi. Fully-homomorphic encryption over the integers with shorter public-keys. Manuscript to appear in Crypto 2011.   Jean-S\u00e9bastien Coron Avradip Mandal David Naccache and Mehdi Tibouchi. Fully-homomorphic encryption over the integers with shorter public-keys. Manuscript to appear in Crypto 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_3_2_1_7_1","volume-title":"Stanford University","author":"Gentry Craig","year":"2009"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry and Shai Halevi. Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Manuscript to appear in FOCS 2011 available at http:\/\/eprint.iacr.org\/2011\/279.  Craig Gentry and Shai Halevi. Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Manuscript to appear in FOCS 2011 available at http:\/\/eprint.iacr.org\/2011\/279.","DOI":"10.1109\/FOCS.2011.94"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","volume-title":"EUROCRYPT","author":"Gentry Craig","year":"2011"},{"key":"e_1_3_2_1_11_1","unstructured":"Shai Halevi 2011. Personal communication.  Shai Halevi 2011. Personal communication."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Yuval\n       \n      Ishai\n     and \n      \n      \n      Anat\n       \n      Paskin\n    .\n      \n  \n   \n  Evaluating branching programs on encrypted data. In Salil P. Vadhan editor TCC volume \n  4392\n   of \n  Lecture Notes in Computer Science pages \n  575\n  --\n  594\n  . \n  Springer 2007\n  .   Yuval Ishai and Anat Paskin. Evaluating branching programs on encrypted data. In Salil P. Vadhan editor TCC volume 4392 of Lecture Notes in Computer Science pages 575--594. Springer 2007.","DOI":"10.1007\/978-3-540-70936-7_31"},{"key":"e_1_3_2_1_13_1","unstructured":"Kristin Lauter Michael Naehrig and Vinod Vaikuntanathan. Can homomorphic encryption be practical? Manuscript at http:\/\/eprint.iacr.org\/2011\/405 2011.  Kristin Lauter Michael Naehrig and Vinod Vaikuntanathan. Can homomorphic encryption be practical? Manuscript at http:\/\/eprint.iacr.org\/2011\/405 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Carlos Aguilar\n       \n      Melchor Philippe\n       \n      Gaborit and \n      \n      \n      Javier\n       \n      Herranz\n    .\n      \n  \n   \n  Additively homomorphic encryption with -operand multiplications. In Tal Rabin editor CRYPTO volume \n  6223\n   of \n  Lecture Notes in Computer Science pages \n  138\n  --\n  154\n  . \n  Springer 2010\n  .   Carlos Aguilar Melchor Philippe Gaborit and Javier Herranz. Additively homomorphic encryption with -operand multiplications. In Tal Rabin editor CRYPTO volume 6223 of Lecture Notes in Computer Science pages 138--154. Springer 2010.","DOI":"10.1007\/978-3-642-14623-7_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2010.26"},{"key":"e_1_3_2_1_19_1","first-page":"169","volume-title":"Foundations of Secure Computation","author":"Rivest Ron","year":"1978"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"e_1_3_2_1_21_1","unstructured":"Nigel P. Smart and Frederik Vercauteren. Fully homomorphic SIMD operations. Manuscript at http:\/\/eprint.iacr.org\/2011\/133 2011.  Nigel P. Smart and Frederik Vercauteren. Fully homomorphic SIMD operations. Manuscript at http:\/\/eprint.iacr.org\/2011\/133 2011."},{"key":"e_1_3_2_1_22_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/978-3-642-17373-8_22","volume-title":"ASIACRYPT","author":"Stehl\u00e9 Damien","year":"2010"}],"event":{"name":"ITCS '12: Innovations in Theoretical Computer Science","location":"Cambridge Massachusetts","acronym":"ITCS '12","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 3rd Innovations in Theoretical Computer Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2090236.2090262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2090236.2090262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:46Z","timestamp":1750241206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2090236.2090262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,8]]},"references-count":22,"alternative-id":["10.1145\/2090236.2090262","10.1145\/2090236"],"URL":"https:\/\/doi.org\/10.1145\/2090236.2090262","relation":{},"subject":[],"published":{"date-parts":[[2012,1,8]]},"assertion":[{"value":"2012-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}