Craig Gentry (b. /73) is an American computer scientist. He is best known for his work in cryptography, specifically fully homomorphic encryption. In Fully Homomorphic Encryption Using Ideal Lattices. Craig Gentry. Stanford University and IBM Watson [email protected] ABSTRACT. List of computer science publications by Craig Gentry. (Leveled) fully homomorphic encryption without bootstrapping. ITCS [c43]. view.

Author: Vutaur Nikorisar
Country: Peru
Language: English (Spanish)
Genre: Politics
Published (Last): 16 February 2008
Pages: 170
PDF File Size: 13.88 Mb
ePub File Size: 16.76 Mb
ISBN: 640-4-86206-631-6
Downloads: 40794
Price: Free* [*Free Regsitration Required]
Uploader: Zulkicage

Hiding secrets in software: Craig GentryCharanjit S.

Fully Secure Functional Encryption without Obfuscation. IBM Search for people.

Craig Gentry’s PhD Thesis

Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. Craig GentryBrent Waters: Structure and Randomness in Encrypted Computation. The NSA cited this as a reason to begin transitioning to lattice-based cryptosystems, or to other “post-quantum” cryptosystems.

Cryptanalyses of Candidate Branching Program Obfuscators. Journal of Computer Security 21 5: Outsourcing Computation to Untrusted Workers. Unlike commonly-used cryptosystems like RSA and elliptic-curve cryptography, lattice-based cryptosystems cannot feasibly as far as we know be broken by quantum computers.


Encrypted Messages from the Heights of Cryptomania. Password authenticated key exchange using hidden smooth subgroups. Craig has also worked on verifiable computation VCwhich allows a user to outsource a computation e.

LewkoBrent Waters: FHE allows data processing to be craog e. Trapdoors for hard lattices and new cryptographic constructions.

Fully Homomorphic Encryption with Polylog Overhead. Attacking cryptographic schemes based on “perturbation polynomials”. Noncommutative Determinant is Hard: Computing on the Edge of Chaos: Craig GentryShai Halevi: Field hmoomorphic in BGV-style homomorphic encryption.

This led to the construction of the first cryptographic program obfuscation schemes with Shai, Sanjam, Mariana Raykova, Amit Sahai, and Brent Watersa major breakthrough that had been thought to be impossible.

Sampling Discrete Gaussians Efficiently and Obliviously.

Adaptive Security in Broadcast Encryption Systems. Homomoorphic Encryption from Instance Independent Assumptions. Public Key Cryptography LewkoAmit SahaiBrent Waters: Graph-Induced Multilinear Maps from Lattices. Fully Homomorphic Encryption over the Integers.

Craig Gentry (computer scientist)

Leveled fully homomorphic encryption without bootstrapping. Secure Distributed Human Computation.

Functional Encryption Without Obfuscation. Computing on the edge of chaos: Leveled Fully Homomorphic Encryption without Bootstrapping. Structure and randomness in encrypted computation. JutlaMariana Raykova: Witness Encryption and its Applications.


Homomorphic Encryption from Learning with Errors: Craig GentryZulfikar Ramzan: How to Compress Reusable Garbled Circuits. He obtained homomkrphic Ph. InCraig constructed the first fully homomorphic encryption Ejcryption scheme, which allows data to be processed in arbitrarily complex ways while it remains encrypted, solving a major open problem that had been unsolved for 30 years. Computing arbitrary functions of encrypted data.

Wireless Personal Communications 29 GoldmanShai HaleviCharanjit S. Computing on Encrypted Data. Craig Gentry gentyr, Philip D. Zeroizing Without Low-Level Zeroes: Craig GentryDaniel Wichs: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. InCraig with Shai and Sanjam Garg, then a postdoc at IBM also constructed the first cryptographic multilinear map scheme, a cryptographic tool that is in some ways even more powerful than FHE.