A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
Towards revealing the mystery behind chain of thought: a theoretical perspective
Recent studies have discovered that Chain-of-Thought prompting (CoT) can dramatically
improve the performance of Large Language Models (LLMs), particularly when dealing with …
improve the performance of Large Language Models (LLMs), particularly when dealing with …
Transformers learn shortcuts to automata
Algorithmic reasoning requires capabilities which are most naturally understood through
recurrent models of computation, like the Turing machine. However, Transformer models …
recurrent models of computation, like the Turing machine. However, Transformer models …
Candidate indistinguishability obfuscation and functional encryption for all circuits
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …
Noninteractive zero knowledge for NP from (plain) learning with errors
C Peikert, S Shiehian - Annual International Cryptology Conference, 2019 - Springer
We finally close the long-standing problem of constructing a noninteractive zero-knowledge
(NIZK) proof system for any NP language with security based on the plain Learning With …
(NIZK) proof system for any NP language with security based on the plain Learning With …
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …
the communities is what security strength the technique can achieve. Nowadays, this …
Fully homomorphic encryption using ideal lattices
C Gentry - Proceedings of the forty-first annual ACM symposium …, 2009 - dl.acm.org
We propose a fully homomorphic encryption scheme--ie, a scheme that allows one to
evaluate circuits over encrypted data without being able to decrypt. Our solution comes in …
evaluate circuits over encrypted data without being able to decrypt. Our solution comes in …
[图书][B] A fully homomorphic encryption scheme
C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …
Such a scheme allows one to compute arbitrary functions over encrypted data without the …
[图书][B] Communication Complexity: and Applications
A Rao, A Yehudayoff - 2020 - books.google.com
Communication complexity is the mathematical study of scenarios where several parties
need to communicate to achieve a common goal, a situation that naturally appears during …
need to communicate to achieve a common goal, a situation that naturally appears during …
How to play any mental game, or a completeness theorem for protocols with honest majority
O Goldreich, S Micali, A Wigderson - … for Cryptography: On the Work of …, 2019 - dl.acm.org
How to play any mental game, or a completeness theorem for protocols with honest majority
Page 1 13How to Play Any Mental Game: A Completeness Theorem for Protocols with Honest …
Page 1 13How to Play Any Mental Game: A Completeness Theorem for Protocols with Honest …