Homomorphic encryption: a mathematical survey (Q6118172): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4526993 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polly Cracker, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Bootstrapping with Polynomial Error / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: General Impossibility of Group Homomorphic Encryption in the Quantum World / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Algorithms for Learning in Presence of Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms for Black-Box Fields and their Application to Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4432349 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP / rank
 
Normal rank
Property / cites work
 
Property / cites work: When Homomorphism Becomes a Liability / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based FHE as secure as PKE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscation of Probabilistic Circuits and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic encryption for arithmetic of approximate numbers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomophic Encryption over the Integers Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonmalleable Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sanitization of FHE Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing arbitrary functions of encrypted data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4589021 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption with Polylog Overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Integer multiplication in time \(O(n\log n)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840170 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Privacy through Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4787198 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2739458 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant depth circuits, Fourier transform, and learnability / rank
 
Normal rank
Property / cites work
 
Property / cites work: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical Homomorphic Encryption for Quantum Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption: From Private-Key to Public-Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: A hierarchy of polynomial time lattice basis reduction algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5397097 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic SIMD operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Blindfolded: New Developments in Fully Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A theory of the learnable / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Homomorphic Encryption over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Algorithms for Some Hidden Shift Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum algorithms for solvable groups / rank
 
Normal rank

Latest revision as of 13:20, 28 August 2024

scientific article; zbMATH DE number 7821731
Language Label Description Also known as
English
Homomorphic encryption: a mathematical survey
scientific article; zbMATH DE number 7821731

    Statements

    Homomorphic encryption: a mathematical survey (English)
    0 references
    0 references
    20 March 2024
    0 references
    Summary: If the first thing that comes to mind when you hear the word ``encryption'' is the Enigma machine, you might think that encryption is complicated and mathematically uninteresting. In fact, many modern encryption systems are quite simple from a mathematical point of view, especially encryption systems that are \textit{homomorphic}. In these systems, the starting point is a homomorphism that respects some binary operation(s), such as \(+\) or \(\times\). Depicting this homomorphism with a rectangular commutative diagram, the objects on the top level of the diagram are called ciphertexts, and the objects on the bottom level are called messages or plaintexts. The downward arrows in the diagram are the homomorphism, which we call decryption. The rightward arrows are the operation(s). Decryption commutes with the operations. To the commutative diagram we add one extra ingredient, computational complexity. Specifically, we need for it to be \textit{easy} (in the sense of polynomial-time) for anyone to compute the rightward arrows in the diagram, but \textit{hard} to learn how to compute the downward (decryption) arrows except with some special information that we will call a ``secret key.'' In short, homomorphic encryption is simply a homomorphism that has been ``hardened'' in the complexity-theoretic sense. Homomorphic encryption allows anyone to compute on encrypted data, without needing (or being able) to decrypt, has many exciting applications. \textit{Fully homomorphic encryption} (FHE) systems, which allow a rich (functionally complete) set of operations, were finally discovered in 2009. But all of the FHE systems that we have discovered so far follow the same blueprint, and we still wonder whether there are other ways to build FHE. This survey presents homomorphic encryption from a mathematical point of view, illustrating with several examples how to start from a homomorphism and harden it to make it suitable for cryptography, pointing out pitfalls and attacks to avoid, laying out the current blueprint for FHE, and (I hope) serving as an inspiration and useful guide in the development of new approaches to FHE. For the entire collection see [Zbl 07816356].
    0 references
    homomorphism
    0 references
    cryptography
    0 references
    encryption
    0 references
    complexity theory
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references