{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:07:04Z","timestamp":1769720824692,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813624","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1518-1529","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data"],"prefix":"10.1145","author":[{"given":"Dario","family":"Catalano","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Catania, Catania, Italy"}]},{"given":"Dario","family":"Fiore","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.40"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D.\n      Boneh X.\n      Boyen and \n      H.\n      Shacham\n  . \n  Short group signatures\n  . In M. Franklin editor CRYPTO \n  2004 volume \n  3152\n   of \n  LNCS pages \n  41\n  --\n  55\n  . \n  Springer Aug. 2004.  D. Boneh X. Boyen and H. Shacham. Short group signatures. In M. Franklin editor CRYPTO 2004 volume 3152 of LNCS pages 41--55. Springer Aug. 2004.","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Z.\n      Brakerski\n     and \n      V.\n      Vaikuntanathan\n  . \n  Fully homomorphic encryption from ring-LWE and security for key dependent messages\n  . In P. Rogaway editor CRYPTO \n  2011 volume \n  6841\n   of \n  LNCS pages \n  505\n  --\n  524\n  . \n  Springer Aug. 2011.   Z. Brakerski and V. Vaikuntanathan. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In P. Rogaway editor CRYPTO 2011 volume 6841 of LNCS pages 505--524. Springer Aug. 2011.","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"C.\n      Cachin J.\n      Camenisch J.\n      Kilian and \n      J.\n      Muller\n  . \n  One-round secure computation and secure autonomous mobile agents\n  . In U. Montanari J. D. P. Rolim and E. Welzl editors ICALP \n  2000 volume \n  1853\n   of \n  LNCS pages \n  512\n  --\n  523\n  . \n  Springer July 2000.   C. Cachin J. Camenisch J. Kilian and J. Muller. One-round secure computation and secure autonomous mobile agents. In U. Montanari J. D. P. Rolim and E. Welzl editors ICALP 2000 volume 1853 of LNCS pages 512--523. Springer July 2000.","DOI":"10.1007\/3-540-45022-X_43"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_26"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"R.\n      Cramer R.\n      Gennaro and \n      B.\n      Schoenmakers\n  . \n  A secure and optimally efficient multi-authority election scheme\n  . In W. Fumy editor EUROCRYPT'97 volume \n  1233\n   of \n  LNCS pages \n  103\n  --\n  118\n  . \n  Springer May \n  1997\n  .   R. Cramer R. Gennaro and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In W. Fumy editor EUROCRYPT'97 volume 1233 of LNCS pages 103--118. Springer May 1997.","DOI":"10.1007\/3-540-69053-0_9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"I.\n      Damg\u00e5rd\n     and \n      M.\n      Jurik\n  . \n  A generalisation a simplification and some applications of Paillier's probabilistic public-key system\n  . In K. Kim editor PKC \n  2001 volume \n  1992\n   of \n  LNCS pages \n  119\n  --\n  136\n  . \n  Springer Feb. 2001.   I. Damg\u00e5rd and M. Jurik. A generalisation a simplification and some applications of Paillier's probabilistic public-key system. In K. Kim editor PKC 2001 volume 1992 of LNCS pages 119--136. Springer Feb. 2001.","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"I.\n      Damg\u00e5rd V.\n      Pastro N. P.\n      Smart and \n      S.\n      Zakarias\n  . \n  Multiparty computation from somewhat homomorphic encryption\n  . In R. Safavi-Naini and R. Canetti editors CRYPTO \n  2012 volume \n  7417\n   of \n  LNCS pages \n  643\n  --\n  662\n  . \n  Springer Aug. 2012.  I. Damg\u00e5rd V. Pastro N. P. Smart and S. Zakarias. Multiparty computation from somewhat homomorphic encryption. In R. Safavi-Naini and R. Canetti editors CRYPTO 2012 volume 7417 of LNCS pages 643--662. Springer Aug. 2012.","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"T.\n      ElGamal\n    .\n  A public key cryptosystem and a signature scheme based on discrete logarithms\n  . In G. R. Blakley and D. Chaum editors CRYPTO'84 volume \n  196\n   of \n  LNCS pages \n  10\n  --\n  18\n  . \n  Springer Aug. \n  1984\n  .   T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. Chaum editors CRYPTO'84 volume 196 of LNCS pages 10--18. Springer Aug. 1984.","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"C.\n      Gentry S.\n      Halevi and \n      V.\n      Vaikuntanathan\n  . \n  i-Hop homomorphic encryption and rerandomizable Yao circuits\n  . In T. Rabin editor CRYPTO \n  2010 volume \n  6223\n   of \n  LNCS pages \n  155\n  --\n  172\n  . \n  Springer Aug. 2010.   C. Gentry S. Halevi and V. Vaikuntanathan. i-Hop homomorphic encryption and rerandomizable Yao circuits. In T. Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 155--172. Springer Aug. 2010.","DOI":"10.1007\/978-3-642-14623-7_9"},{"key":"e_1_3_2_1_19_1","unstructured":"GMP. The GNU Multi Precision Arithmetic Library. http:\/\/www.gmplib.org.  GMP. The GNU Multi Precision Arithmetic Library. http:\/\/www.gmplib.org."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_22"},{"key":"e_1_3_2_1_23_1","unstructured":"S. Halevi and V. Shoup. Helib. https:\/\/github.com\/shaih\/HElib.  S. Halevi and V. Shoup. Helib. https:\/\/github.com\/shaih\/HElib."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Y.\n      Ishai\n     and \n      A.\n      Paskin\n  . \n  Evaluating branching programs on encrypted data\n  . In S. P. Vadhan editor TCC \n  2007 volume \n  4392\n   of \n  LNCS pages \n  575\n  --\n  594\n  . \n  Springer Feb. 2007.   Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In S. P. Vadhan editor TCC 2007 volume 4392 of LNCS pages 575--594. Springer Feb. 2007.","DOI":"10.1007\/978-3-540-70936-7_31"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"M.\n      Joye\n     and \n      B.\n      Libert\n  . \n  Efficient cryptosystems from $2^k$-th power residue symbols\n  . In T. Johansson and P. Q. Nguyen editors EUROCRYPT \n  2013 volume \n  7881\n   of \n  LNCS pages \n  76\n  --\n  92\n  . \n  Springer May 2013.  M. Joye and B. Libert. Efficient cryptosystems from $2^k$-th power residue symbols. In T. Johansson and P. Q. Nguyen editors EUROCRYPT 2013 volume 7881 of LNCS pages 76--92. Springer May 2013.","DOI":"10.1007\/978-3-642-38348-9_5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796363"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"C. A.\n      Melchor P.\n      Gaborit and \n      J.\n      Herranz\n  . \n  Additively homomorphic encryption with d-operand multiplications\n  . In T. Rabin editor CRYPTO \n  2010 volume \n  6223\n   of \n  LNCS pages \n  138\n  --\n  154\n  . \n  Springer Aug. 2010.   C. A. Melchor P. Gaborit and J. Herranz. Additively homomorphic encryption with d-operand multiplications. In T. Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 138--154. Springer Aug. 2010.","DOI":"10.1007\/978-3-642-14623-7_8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288106"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"T.\n      Okamoto\n     and \n      S.\n      Uchiyama\n  . \n  A new public-key cryptosystem as secure as factoring\n  . In K. Nyberg editor EUROCRYPT'98 volume \n  1403\n   of \n  LNCS pages \n  308\n  --\n  318\n  . \n  Springer May \/ June \n  1998\n  .  T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In K. Nyberg editor EUROCRYPT'98 volume 1403 of LNCS pages 308--318. Springer May \/ June 1998.","DOI":"10.1007\/BFb0054135"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"P.\n      Paillier\n    .\n  Public-key cryptosystems based on composite degree residuosity classes\n  . In J. Stern editor EUROCRYPT'99 volume \n  1592\n   of \n  LNCS pages \n  223\n  --\n  238\n  . \n  Springer May \n  1999\n  .   P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern editor EUROCRYPT'99 volume 1592 of LNCS pages 223--238. Springer May 1999.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_34_1","first-page":"169","volume-title":"On data banks and privacy homomorphisms. Foundations of Secure Computation","author":"Rivest R. L.","year":"1978"},{"key":"e_1_3_2_1_35_1","first-page":"554","volume-title":"40th FOCS","author":"Sander T.","year":"1999"},{"key":"e_1_3_2_1_36_1","unstructured":"V. Shoup. Ntl library. http:\/\/www.shoup.net\/ntl\/.  V. Shoup. Ntl library. http:\/\/www.shoup.net\/ntl\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":37,"alternative-id":["10.1145\/2810103.2813624","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813624","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}