{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363670321001986432.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1007/978-3-642-36362-7_1"}},{"identifier":{"@type":"URI","@value":"https://link.springer.com/content/pdf/10.1007/978-3-642-36362-7_1"}}],"dc:title":[{"@value":"Packed Ciphertexts in LWE-Based Homomorphic Encryption"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1383670321001986433","@type":"Researcher","foaf:name":[{"@value":"Zvika Brakerski"}]},{"@id":"https://cir.nii.ac.jp/crid/1383670321001986434","@type":"Researcher","foaf:name":[{"@value":"Craig Gentry"}]},{"@id":"https://cir.nii.ac.jp/crid/1383670321001986432","@type":"Researcher","foaf:name":[{"@value":"Shai Halevi"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"03029743"},{"@type":"EISSN","@value":"16113349"},{"@type":"ISBN","@value":"9783642363610"},{"@type":"ISBN","@value":"9783642363627"}],"prism:publicationName":[{"@value":"Lecture Notes in Computer Science"}],"dc:publisher":[{"@value":"Springer Berlin Heidelberg"}],"prism:publicationDate":"2013","prism:startingPage":"1","prism:endingPage":"13"},"reviewed":"false","dc:rights":["https://www.springer.com/tdm","https://www.springer.com/tdm"],"url":[{"@id":"https://link.springer.com/content/pdf/10.1007/978-3-642-36362-7_1"}],"createdAt":"2013-02-04","modifiedAt":"2021-09-01","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360004230583315072","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"A Generic yet Efficient Method for Secure Inner Product"}]},{"@id":"https://cir.nii.ac.jp/crid/1360004230697777792","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics"}]},{"@id":"https://cir.nii.ac.jp/crid/1360285710359817216","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Privacy-Preserving Statistical Analysis by Exact Logistic Regression"}]},{"@id":"https://cir.nii.ac.jp/crid/1360848655479698816","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption"}]},{"@id":"https://cir.nii.ac.jp/crid/1390019534938092544","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Privacy Preserving Function Evaluation Using Lookup Tables with Word-Wise FHE"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282679353004544","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282681287328128","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Key-Private Proxy Re-Encryption from Lattices, Revisited"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1007/978-3-642-36362-7_1"},{"@type":"CROSSREF","@value":"10.1007/978-3-319-64701-2_16_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"},{"@type":"CROSSREF","@value":"10.1007/978-3-642-40588-4_5_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"},{"@type":"CROSSREF","@value":"10.1109/spw.2015.14_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"},{"@type":"CROSSREF","@value":"10.1587/transfun.2023eap1114_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"},{"@type":"CROSSREF","@value":"10.1007/978-3-319-19962-7_27_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"},{"@type":"CROSSREF","@value":"10.1587/transfun.e98.a.100_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"},{"@type":"CROSSREF","@value":"10.1587/transcom.2015ebp3359_references_DOI_aHvXmJKElPS7y8FjCE9WcAxOsYa"}]}