WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph
Abstract
Index Terms
- WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph
Recommendations
WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityThe 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography is held in Los Angeles, CA, USA on November 7, 2022, co-located with the ACM Conference on Computer and Communications Security (CCS). The workshop aims to bring together ...
WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityThe 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography is held in Toronto, ON, Canada on October 19th, 2018, co-located with the ACM Conference on Computer and Communications Security (CCS). The workshop aims to bring together ...
Homomorphic encryption and secure comparison
We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Lorenzo Cavallaro,
- Johannes Kinder,
- Program Chairs:
- XiaoFeng Wang,
- Jonathan Katz
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 152Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in