scispace - formally typeset
C

Craig Gentry

Researcher at IBM

Publications -  223
Citations -  44234

Craig Gentry is an academic researcher from IBM. The author has contributed to research in topics: Encryption & Homomorphic encryption. The author has an hindex of 75, co-authored 222 publications receiving 39327 citations. Previous affiliations of Craig Gentry include Stanford University & NTT DoCoMo.

Papers
More filters
Patent

Method and apparatus for efficient certificate revocation

TL;DR: In this article, the authors propose a solution based on the construction of grounded dense hash trees for revocation of digital certificates in a public-key infrastructure, particularly in the case when a certificate might need to be revoked prior to its expirations.
Patent

Fast evaluation of many polynomials with small coefficients on the same point

TL;DR: In this paper, a method for evaluating at point r one or more polynomials p1(x),..., pl(x) of maximum degree up to n−1 was presented.
Book ChapterDOI

RSA Accumulator Based Broadcast Encryption

TL;DR: This paper describes a technique for achieving full key derivability given any broadcast encryption scheme in the general subset-cover framework and derives a new lower bound that characterizes the tradeoffs inherent in broadcast encryption schemes which use the technique.
Journal Article

Aggregate and verifiably encrypted signatures from bilinear maps

TL;DR: Boneh, Lynn, and Shacham as mentioned in this paper introduced the concept of an aggregate signature, presented security models for such signatures, and gave several applications for aggregate signatures. And they constructed an efficient aggregate signature from a recent short signature scheme based on bilinear maps.
Patent

Encryption and signature schemes using message mappings to reduce the message size

TL;DR: In this paper, a message is processed before encryption so that the encryption method generates a short ciphertext, and the message processing can be viewed as a mapping (610) that maps the message into another message that generates the short cipher text.