Craig Gentry

Orcid: 0009-0000-6651-7262

Affiliations:
  • IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA


According to our database1, Craig Gentry authored at least 109 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Resource Estimation of CGGI and CKKS scheme workloads on FracTLcore Computing Fabric.
CoRR, October, 2025

Fully Homomorphic Encryption for Matrix Arithmetic.
IACR Cryptol. ePrint Arch., 2025

2024
STOP-HCV-HCC Program: Privacy-Preserving Innovation for Remote Data Access Analytics at Federally Qualified Health Centers in South Texas.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024

Fast Two-party Threshold ECDSA with Proactive Security.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2022
Achievable CCA2 Relaxation for Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Random-Index PIR and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Random-index PIR with Applications to Large-Scale Secure MPC.
IACR Cryptol. ePrint Arch., 2020

Can a Blockchain Keep a Secret?
IACR Cryptol. ePrint Arch., 2020

Can a Public Blockchain Keep a Secret?
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
Compressible FHE with Applications to PIR.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Homomorphic Encryption for Finite Automata.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free.
IACR Cryptol. ePrint Arch., 2018

Obfuscation using Tensor Products.
Electron. Colloquium Comput. Complex., 2018

A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Doing Real Work with FHE: The Case of Logistic Regression.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Cryptanalyses of Candidate Branching Program Obfuscators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Hiding secrets in software: a cryptographic approach to program obfuscation.
Commun. ACM, 2016

Functional Encryption Without Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015

Cryptanalysis of the Quadratic Zero-Testing of GGH.
IACR Cryptol. ePrint Arch., 2015

Graph-Induced Multilinear Maps from Lattices.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Private Database Access with HE-over-ORAM Architecture.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.
IACR Cryptol. ePrint Arch., 2014

Garbled RAM Revisited, Part I.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Functional Encryption without Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Attribute Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2014

Computing on the edge of chaos: Structure and randomness in encrypted computation.
Electron. Colloquium Comput. Complex., 2014

Two-Round Secure MPC from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Outsourcing Private RAM Computation.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Garbled RAM Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Witness Encryption from Instance Independent Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's Theorem.
Proceedings of the IEEE 29th Conference on Computational Complexity, 2014

2013
Field switching in BGV-style homomorphic encryption.
J. Comput. Secur., 2013

How to Compress (Reusable) Garbled Circuits.
IACR Cryptol. ePrint Arch., 2013

Encrypted Messages from the Heights of Cryptomania.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Witness encryption and its applications.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Pinocchio: Nearly Practical Verifiable Computation.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Packed Ciphertexts in LWE-Based Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Optimizing ORAM and Using It Efficiently for Secure Computation.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

Quadratic Span Programs and Succinct NIZKs without PCPs.
Proceedings of the Advances in Cryptology, 2013

Candidate Multilinear Maps from Ideal Lattices.
Proceedings of the Advances in Cryptology, 2013

Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Attribute-Based Encryption for Circuits from Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Private Database Queries Using Somewhat Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Ring Switching in BGV-Style Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2012

Candidate Multilinear Maps from Ideal Lattices and Applications.
IACR Cryptol. ePrint Arch., 2012

Sampling Discrete Gaussians Efficiently and Obliviously.
IACR Cryptol. ePrint Arch., 2012

Ring Switching in BGV-Style Homomorphic Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Better Bootstrapping in Fully Homomorphic Encryption.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

(Leveled) fully homomorphic encryption without bootstrapping.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

Fully Homomorphic Encryption with Polylog Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Homomorphic Evaluation of the AES Circuit.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Fully Homomorphic Encryption without Bootstrapping.
Electron. Colloquium Comput. Complex., 2011

Separating succinct non-interactive arguments from all falsifiable assumptions.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Implementing Gentry's Fully-Homomorphic Encryption Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.
IACR Cryptol. ePrint Arch., 2010

Computing arbitrary functions of encrypted data.
Commun. ACM, 2010

A Simple BGN-Type Cryptosystem from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

<i>i</i>-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.
Proceedings of the Advances in Cryptology, 2010

Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.
Proceedings of the Advances in Cryptology, 2010

Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
Proceedings of the Advances in Cryptology, 2010

2009
A fully homomorphic encryption scheme.
PhD thesis, 2009

Hierarchical Identity Based Encryption with Polynomially Many Levels.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Fully homomorphic encryption using ideal lattices.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
Proceedings of the Advances in Cryptology, 2009

Attacking cryptographic schemes based on "perturbation polynomials".
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Computing on Encrypted Data.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur., 2008

Adaptive Security in Broadcast Encryption Systems.
IACR Cryptol. ePrint Arch., 2008

Trapdoors for hard lattices and new cryptographic constructions.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

2007
Space-Efficient Identity Based Encryption Without Pairings.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Secure Distributed Human Computation.
Proceedings of the Security Protocols, 2006

Identity-Based Aggregate Signatures.
Proceedings of the Public Key Cryptography, 2006

IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Explicit Exclusive Set Systems with Applications to Broadcast Encryption.
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006

Practical Identity-Based Encryption Without Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

A Method for Making Password-Based Key Exchange Resilient to Server Compromise.
Proceedings of the Advances in Cryptology, 2006

2005
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media.
IEEE J. Sel. Areas Commun., 2005

Secure distributed human computation.
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

Single-Database Private Information Retrieval with Constant Communication Rate.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Secure Distributed <i>Human</i> Computation.
Proceedings of the Financial Cryptography and Data Security, 2005

Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2005

Password authenticated key exchange using hidden smooth subgroups.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2005

2004
Provable Cryptographic Security and its Applications to Mobile Wireless Computing.
Wirel. Pers. Commun., 2004

QuasiModo: Efficient Certificate Validation and Revocation.
Proceedings of the Public Key Cryptography, 2004

RSA Accumulator Based Broadcast Encryption.
Proceedings of the Information Security, 7th International Conference, 2004

Microcredits for Verifiable Foreign Service Provider Metering.
Proceedings of the Financial Cryptography, 2004

How to Compress Rabin Ciphertexts and Signatures (and More).
Proceedings of the Advances in Cryptology, 2004

A System for End-to-End Authentication of Adaptive Multimedia Content.
Proceedings of the Communications and Multimedia Security, 2004

Eliminating Random Permutation Oracles in the Even-Mansour Cipher.
Proceedings of the Advances in Cryptology, 2004

2003
Certificate-Based Encryption and the Certificate Revocation Problem.
Proceedings of the Advances in Cryptology, 2003

Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
Proceedings of the Advances in Cryptology, 2003

2002
Cryptanalysis of the Revised NTRU Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Hierarchical ID-Based Cryptography.
Proceedings of the Advances in Cryptology, 2002

2001
Key Recovery and Message Attacks on NTRU-Composite.
Proceedings of the Advances in Cryptology, 2001

Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
Proceedings of the Advances in Cryptology, 2001


  Loading...