A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Towards revealing the mystery behind chain of thought: a theoretical perspective

G Feng, B Zhang, Y Gu, H Ye, D He… - Advances in Neural …, 2024 - proceedings.neurips.cc
Recent studies have discovered that Chain-of-Thought prompting (CoT) can dramatically
improve the performance of Large Language Models (LLMs), particularly when dealing with …

Transformers learn shortcuts to automata

B Liu, JT Ash, S Goel, A Krishnamurthy… - arXiv preprint arXiv …, 2022 - arxiv.org
Algorithmic reasoning requires capabilities which are most naturally understood through
recurrent models of computation, like the Turing machine. However, Transformer models …

Candidate indistinguishability obfuscation and functional encryption for all circuits

S Garg, C Gentry, S Halevi, M Raykova, A Sahai… - SIAM Journal on …, 2016 - SIAM
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …

Noninteractive zero knowledge for NP from (plain) learning with errors

C Peikert, S Shiehian - Annual International Cryptology Conference, 2019 - Springer
We finally close the long-standing problem of constructing a noninteractive zero-knowledge
(NIZK) proof system for any NP language with security based on the plain Learning With …

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

H Xu, Y Zhou, J Ming, M Lyu - Cybersecurity, 2020 - Springer
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …

Fully homomorphic encryption using ideal lattices

C Gentry - Proceedings of the forty-first annual ACM symposium …, 2009 - dl.acm.org
We propose a fully homomorphic encryption scheme--ie, a scheme that allows one to
evaluate circuits over encrypted data without being able to decrypt. Our solution comes in …

[图书][B] A fully homomorphic encryption scheme

C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …

[图书][B] Communication Complexity: and Applications

A Rao, A Yehudayoff - 2020 - books.google.com
Communication complexity is the mathematical study of scenarios where several parties
need to communicate to achieve a common goal, a situation that naturally appears during …

How to play any mental game, or a completeness theorem for protocols with honest majority

O Goldreich, S Micali, A Wigderson - … for Cryptography: On the Work of …, 2019 - dl.acm.org
How to play any mental game, or a completeness theorem for protocols with honest majority
Page 1 13How to Play Any Mental Game: A Completeness Theorem for Protocols with Honest …