C
Craig Gentry
Researcher at IBM
Publications - 223
Citations - 44234
Craig Gentry is an academic researcher from IBM. The author has contributed to research in topics: Encryption & Homomorphic encryption. The author has an hindex of 75, co-authored 222 publications receiving 39327 citations. Previous affiliations of Craig Gentry include Stanford University & NTT DoCoMo.
Papers
More filters
Patent
Method and apparatus for efficient certificate revocation
Craig Gentry,Zulfikar Ramzan +1 more
TL;DR: In this article, the authors propose a solution based on the construction of grounded dense hash trees for revocation of digital certificates in a public-key infrastructure, particularly in the case when a certificate might need to be revoked prior to its expirations.
Patent
Fast evaluation of many polynomials with small coefficients on the same point
Craig Gentry,Shai Halevi +1 more
TL;DR: In this paper, a method for evaluating at point r one or more polynomials p1(x),..., pl(x) of maximum degree up to n−1 was presented.
Book ChapterDOI
RSA Accumulator Based Broadcast Encryption
Craig Gentry,Zulfikar Ramzan +1 more
TL;DR: This paper describes a technique for achieving full key derivability given any broadcast encryption scheme in the general subset-cover framework and derives a new lower bound that characterizes the tradeoffs inherent in broadcast encryption schemes which use the technique.
Journal Article
Aggregate and verifiably encrypted signatures from bilinear maps
TL;DR: Boneh, Lynn, and Shacham as mentioned in this paper introduced the concept of an aggregate signature, presented security models for such signatures, and gave several applications for aggregate signatures. And they constructed an efficient aggregate signature from a recent short signature scheme based on bilinear maps.
Patent
Encryption and signature schemes using message mappings to reduce the message size
TL;DR: In this paper, a message is processed before encryption so that the encryption method generates a short ciphertext, and the message processing can be viewed as a mapping (610) that maps the message into another message that generates the short cipher text.