Author of the publication

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.

, , , , and . Future Gener. Comput. Syst., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical learning based fully homomorphic encryption on encrypted data., , , and . Soft Comput., 21 (24): 7473-7483 (2017)Lattice-based searchable public-key encryption scheme for secure cloud storage., , , and . IJWGS, 14 (1): 3-20 (2018)Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients., , and . Cryptologia, 46 (2): 148-166 (2022)Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol., , , , and . Int. J. Netw. Secur., 19 (5): 776-784 (2017)User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System., , , , , and . Int. J. Netw. Secur., 18 (4): 769-781 (2016)Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage., , , , and . IEEE Trans. Serv. Comput., 16 (1): 134-146 (January 2023)PFLM: Privacy-preserving federated learning with membership proof., , and . Inf. Sci., (2021)Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers., , , , , and . IEEE Internet Things J., 10 (17): 15563-15580 (September 2023)A new group signature scheme for dynamic membership., , , and . Int. J. Electron. Secur. Digit. Forensics, 8 (4): 332-351 (2016)Server-aided searchable encryption in multi-user setting., , , and . Comput. Commun., (2020)