Author of the publication

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption.

, , , , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Secure Matrix Multiplication from Ring-LWE., , and . CANS, volume 11261 of Lecture Notes in Computer Science, page 93-111. Springer, (2017)Hardness Estimation of LWE via Band Pruning., , and . IACR Cryptology ePrint Archive, (2015)Key-Private Proxy Re-encryption under LWE., , , and . INDOCRYPT, volume 8250 of Lecture Notes in Computer Science, page 1-18. Springer, (2013)Lower Bounds on Lattice Enumeration with Extreme Pruning., , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 608-637. Springer, (2018)Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption., , , and . SCC@AsiaCCS, page 35-42. ACM, (2017)Scalable and Secure Logistic Regression via Homomorphic Encryption., , , and . CODASPY, page 142-144. ACM, (2016)Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE., and . IACR Cryptol. ePrint Arch., (2023)Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE., and . CANS, volume 14342 of Lecture Notes in Computer Science, page 28-50. Springer, (2023)Privacy-Preserving Deep Learning: Revisited and Enhanced., , , , and . ATIS, volume 719 of Communications in Computer and Information Science, page 100-110. Springer, (2017)The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers., , , , , , and . CoRR, (2021)