Authors: Dan Boneh, Eu-Jin Goh, and Kobbi Nissim.
Abstract:
Let Ψ be a 2-DNF formula on boolean variables
x1,…,xn ∈ {0,1}. We present a
homomorphic public key encryption scheme that allows the public
evaluation of Ψ given an encryption of the variables
x1,…,xn. In other words, given the encryption of the bits
x1,…,xn, anyone can create the encryption of
Ψ(x1,…,xn). More generally, we can evaluate
Reference:
In the Proceedings of Theory of Cryptography Conference 2005.
BibTex: bib
Full Paper:
Last updated on 2 Apr 2006 pdf, ps
Slides:
Theory of Cryptography Conference 2005, Stanford Security Forum
Related Papers:
NA.