{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:21:37Z","timestamp":1740158497205,"version":"3.37.3"},"reference-count":16,"publisher":"Walter de Gruyter GmbH","issue":"0","funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141210758"],"award-info":[{"award-number":["N000141210758"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,19]]},"abstract":"<jats:title>Abstract<\/jats:title>\n            <jats:p>We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data.\nOur encryption though is private-key; public information is only used to operate on encrypted data without decrypting it.\nStill, we show that our method allows for a third party search on encrypted data.<\/jats:p>","DOI":"10.1515\/gcc-2018-0006","type":"journal-article","created":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T22:15:58Z","timestamp":1524176158000},"source":"Crossref","is-referenced-by-count":1,"title":["Practical private-key fully homomorphic encryption in rings"],"prefix":"10.1515","volume":"0","author":[{"given":"Alexey","family":"Gribov","sequence":"first","affiliation":[]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"374","reference":[{"key":"ref111","first-page":"617","article-title":"FHE Bootstrapping in less than a second","year":"2015","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2015"},{"key":"ref31","first-page":"617","article-title":"FHE Bootstrapping in less than a second","year":"2015","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2015"},{"journal-title":"Preprint","key":"ref71","article-title":"HElib \u2013 An implementation of homomorphic encryption"},{"key":"ref121","first-page":"169","article-title":"Fully homomorphic encryption using ideal lattices","year":"2009","journal-title":"Proceedings of the 41st annual ACM Symposium on Theory of Computing\u2014STOC \u201909"},{"journal-title":"Preprint","key":"ref151","article-title":"HElib \u2013 An implementation of homomorphic encryption"},{"key":"ref41","first-page":"169","article-title":"Fully homomorphic encryption using ideal lattices","year":"2009","journal-title":"Proceedings of the 41st annual ACM Symposium on Theory of Computing\u2014STOC \u201909"},{"key":"ref101","first-page":"24","article-title":"Fully homomorphic encryption over the integers","year":"2010","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2010"},{"key":"ref01","first-page":"309","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","year":"2012","journal-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science\u2014Conference ITCS 2012"},{"key":"ref21","first-page":"24","article-title":"Fully homomorphic encryption over the integers","year":"2010","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2010"},{"key":"ref81","first-page":"309","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","year":"2012","journal-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science\u2014Conference ITCS 2012"},{"key":"ref61","first-page":"554","article-title":"Algorithms in HElib","year":"2014","journal-title":"Advances in Cryptology\u2014CRYPTO 2014"},{"key":"ref131","first-page":"305","article-title":"Homomorphic public-key cryptosystems over groups and rings","volume":"13","year":"2004","journal-title":"Quad. Mat."},{"key":"ref91","first-page":"97","article-title":"Efficient fully homomorphic encryption from (standard) LWE","year":"2011","journal-title":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science\u2014FOCS 2011"},{"key":"ref51","first-page":"305","article-title":"Homomorphic public-key cryptosystems over groups and rings","volume":"13","year":"2004","journal-title":"Quad. Mat."},{"key":"ref141","first-page":"554","article-title":"Algorithms in HElib","year":"2014","journal-title":"Advances in Cryptology\u2014CRYPTO 2014"},{"key":"ref11","first-page":"97","article-title":"Efficient fully homomorphic encryption from (standard) LWE","year":"2011","journal-title":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science\u2014FOCS 2011"}],"container-title":["Groups Complexity Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/gcc.ahead-of-print\/gcc-2018-0006\/gcc-2018-0006.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.degruyter.com\/view\/j\/gcc.ahead-of-print\/gcc-2018-0006\/gcc-2018-0006.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T03:08:50Z","timestamp":1614395330000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/gcc-2018-0006\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":16,"journal-issue":{"issue":"0"},"URL":"https:\/\/doi.org\/10.1515\/gcc-2018-0006","relation":{},"ISSN":["1867-1144","1869-6104"],"issn-type":[{"type":"print","value":"1867-1144"},{"type":"electronic","value":"1869-6104"}],"subject":[],"published":{"date-parts":[[2018,4,19]]}}}