HomeCustomersPricingBlog

Evervault Papers

Crypto means cryptography

The most important cryptography papers spanning the past, present, and future of cryptosystems & cryptology.

Non-Malleable Cryptography
Non-Malleable Cryptography

Danny Dolev, Cynthia Dwork, & Moni Naor

On the (Im)possibility of Obfuscating Programs
On the (Im)possibility of Obfuscating Programs

Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, & Ke Yang

Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups
Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups

David L. Chaum

A Digital Signature Based on a Conventional Encryption Function
A Digital Signature Based on a Conventional Encryption Function

Ralph C. Merkle

The Knowledge Complexity of Interactive Proof-Systems
The Knowledge Complexity of Interactive Proof-Systems

Shafi Goldwasser, Silvio Micali, & Charles Rackoffero

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security

Matt Blaze, Whit eld Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, & Michael Wiener

CryptDB: Protecting Confidentiality with Encrypted Query Processing
CryptDB: Protecting Confidentiality with Encrypted Query Processing

Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, & Hari Balakrishnan

Protocols for Secure Computations
Protocols for Secure Computations

Andrew C. Yao

Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System

Satoshi Nakamoto

A fully homomorphic encryption scheme
A fully homomorphic encryption scheme

Craig Gentry

On Data Banks and Privacy Homomorphisms
On Data Banks and Privacy Homomorphisms

Ronald L. Rivest, Len Adleman, & Michael L. Dertouzos

On Data Banks and Privacy Homomorphisms

On Data Banks and Privacy Homomorphisms

Ronald L. Rivest, Len Adleman, & Michael L. Dertouzos — Published October 1978

In On Data Banks and Privacy Homomorphisms, Rivest, Adleman, and Dertouzos proposed the problems of (1) modifying a hardware computer system to solve the problem of performing operations on encrypted data securely, and (2) the problem of constructing what has come to be known as a fully-homomorphic encryption (FHE) scheme.

The RSA public-key cryptosystem is a partially homomorphic encryption scheme, where the multiplication of the ciphertext C is reflected in the plaintext P:

Encrypt P to get C, multiply C by 2, and then decrypt 2C — and you get 2P. That’s a homomorphism: perform some mathematical operation to the ciphertext, and that operation is reflected in the plaintext.” — Bruce Schneier

A FHE cryptosystem is one that is homomorphic under both addition and multiplication and yet still secure. FHE makes it possible to perform arbitrary computations on encrypted data while it remains encrypted — and without needing a secret key. In short, you can process encrypted data without ever decrypting it.

It was not until 2009 when Craig Gentry published a plausible construction of a FHE scheme.

Download PDF
A fast quantum mechanical algorithm for database search
A fast quantum mechanical algorithm for database search

Lov K. Grover

Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

Peter Shor

Use of Elliptic Curves in Cryptography
Use of Elliptic Curves in Cryptography

Victor Miller

Elliptic Curve Cryptosystems
Elliptic Curve Cryptosystems

Neal Koblitz

A Method for Obtaining Digital Signatures and Public Key Cryptosystems
A Method for Obtaining Digital Signatures and Public Key Cryptosystems

Ronald L. Rivest, Adi Shamir, & Len Adleman

New Directions in Cryptography
New Directions in Cryptography

Whitfield Diffie & Martin E. Hellman

Cramming more components onto integrated circuits
Cramming more components onto integrated circuits

Gordon Moore

A Mathematical Theory of Cryptography
A Mathematical Theory of Cryptography

Claude E. Shannon

La Cryptographie Militaire
La Cryptographie Militaire

Auguste Kerckhoffs