Craig B. Gentry  Craig B. Gentry photo       

contact information

Distinguished RSM
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash2289

links



2016

Functional Encryption Without Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II, pp. 480--511

Pinocchio: nearly practical verifiable computation
Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova
Commun. ACM 59(2), 103--112, 2016


2015

Graph-Induced Multilinear Maps from Lattices
Craig Gentry, Sergey Gorbunov, Shai Halevi
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II, pp. 498--527

Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry, Allison Bishop Lewko, Amit Sahai, Brent Waters
IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, pp. 151--170

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Jean-S\'{e}bastien Coron, Craig Gentry, Shai Halevi, Tancr\`{e}de Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 247--266

Private Database Access with HE-over-ORAM Architecture
Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers, pp. 172--191

Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith
J. Cryptology 28(4), 820--843, 2015


2014

Computing on the edge of chaos: Structure and randomness in encrypted computation
Craig Gentry
Electronic Colloquium on Computational Complexity (ECCC)21, 106, 2014

Two-Round Secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 74--94

Outsourcing Private RAM Computation
Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, Philadelphia, PA, USA, October 18-21, 2014, pp. 404--413

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, pp. 533--556

Garbled RAM Revisited
Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, pp. 405--422

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pp. 518--535

Witness Encryption from Instance Independent Assumptions
Craig Gentry, Allison B. Lewko, Brent Waters
Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pp. 426--443

Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's Theorem
Craig Gentry
IEEE 29th Conference on Computational Complexity, CCC 2014, Vancouver, BC, Canada, June 11-13, 2014, pp. 181--187


2013


Witness encryption and its applications
Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013, pp. 467--476

Packed Ciphertexts in LWE-Based Homomorphic Encryption
Zvika Brakerski, Craig Gentry, Shai Halevi
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 1--13

Optimizing ORAM and Using It Efficiently for Secure Computation
Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs
Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings, pp. 1--18

Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA, pp. 40--49

Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, pp. 626--645

Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg, Craig Gentry, Shai Halevi
Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, pp. 1--17

Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II, pp. 479--499

Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry, Amit Sahai, Brent Waters
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, pp. 75--92

Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I, pp. 97--116

Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings, pp. 102--118

Field switching in BGV-style homomorphic encryption
Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
Journal of Computer Security 21(5), 663--684, 2013


2012

Ring Switching in BGV-Style Homomorphic Encryption
Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 19--37

Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry, Shai Halevi, Nigel P. Smart
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pp. 1--16

Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry, Shai Halevi, Nigel P. Smart
Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, pp. 465--482

Homomorphic Evaluation of the AES Circuit
Craig Gentry, Shai Halevi, Nigel P. Smart
Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, pp. 850--867

(Leveled) fully homomorphic encryption without bootstrapping
Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan
Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012, pp. 309--325