(Leveled) fully homomorphic encryption without bootstrapping

From MaRDI portal
Revision as of 19:40, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2826066

DOI10.1145/2090236.2090262zbMath1347.68120OpenAlexW2152926062WikidataQ130851568 ScholiaQ130851568MaRDI QIDQ2826066

Zvika Brakerski, Vinod Vaikuntanathan, Craig Gentry

Publication date: 7 October 2016

Published in: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2090236.2090262






Related Items (only showing first 100 items - show all)

Verifiable Decryption for Fully Homomorphic EncryptionParameter optimization and larger precision for (T)FHEMixed-technique multi-party computations composed of two-party computationsBatched fully homomorphic encryption from TFHEAchievable \textsf{CCA2} relaxation for homomorphic encryptionEvalRound algorithm in CKKS bootstrappingFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingScooby: improved multi-party homomorphic secret sharing based on FHETowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherComputing primitive idempotents in finite commutative rings and applicationsTransciphering framework for approximate homomorphic encryptionImproved programmable bootstrapping with larger precision and efficient arithmetic circuits for TFHEDilithium for memory constrained devicesLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingEntropic hardness of Module-LWE from module-NTRUMore efficient verifiable functional encryptionScooby: improved multi-party homomorphic secret sharing based on FHEMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNFast blind rotation for bootstrapping FHEsHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreError correction and ciphertext quantization in lattice cryptographyA lower bound for proving hardness of learning with rounding with polynomial modulusPrivate AI: Machine Learning on Encrypted DataToward practical privacy-preserving linear regressionHardness of (M)LWE with semi-uniform seedsAchievable \textsf{CCA2} relaxation for homomorphic encryptionLattice-Based DAPS and Generalizations: Self-enforcement in Signature SchemesOblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic EncryptionOn Extension of Evaluation Algorithms in Keyed-Homomorphic EncryptionOptimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHEOn the Hardness of Scheme-Switching Between SIMD FHE SchemesHardness of entropic module-LWEDoubly efficient private information retrieval and fully homomorphic RAM computation from ring LWESpherical Gaussian leftover hash lemma via the Rényi divergenceA lattice attack on CRYSTALS-Kyber with correlation power analysisSecure outsourced matrix multiplication with fully homomorphic encryptionPractical randomized lattice gadget decomposition with application to FHEImproved homomorphic evaluation for hash function based on TFHEOn the multi-user security of LWE-based NIKESimple threshold (fully homomorphic) encryption from LWE with polynomial modulusG+G: a Fiat-Shamir lattice signature based on convolved GaussiansPractical and efficient FHE-based MPCHomomorphic encryption of the \(k = 2\) Bernstein-Vazirani algorithmEfficient updatable public-key encryption from latticesCCA-1 secure updatable encryption with adaptive securityAmortized bootstrapping revisited: simpler, asymptotically-faster, implementedOn the precision loss in approximate homomorphic encryptionTowards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitationsVector commitments with proofs of smallness: short range proofs and moreRing/module learning with errors under linear leakage -- hardness and applicationsFully homomorphic encryption beyond IND-CCA1 security: integrity through verifiabilityBootstrapping bits with CKKSTime-based attribute-based proxy re-encryption with decryption key updateA systematic study of sparse LWEFaster private decision tree evaluation for batched input from homomorphic encryptionAttribute-based keyed fully homomorphic encryptionConstraining and Watermarking PRFs from Milder AssumptionsHomomorphic Encryption StandardAn Improved Leveled Fully Homomorphic Encryption Scheme over the IntegersFully Homomorphic Encryption with Auxiliary InputsEfficient Secure Multiparty Computation with Identifiable AbortTargeted Homomorphic Attribute-Based EncryptionSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionDepth Optimized Efficient Homomorphic SortingPrivate Computation on Encrypted Genomic DataEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesAugmented Learning with Errors: The Untapped Potential of the Error TermA New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOVPrivacy-preserving blueprintsOn polynomial functions Modulo \(p^e\) and faster bootstrapping for homomorphic encryptionRinocchio: SNARKs for ring arithmeticA Homomorphic Proxy Re-encryption from LatticesOptimisations and tradeoffs for HElibPost-quantum anonymity of KyberOblivious message retrievalSolving LWR via BDD Strategy: Modulus Switching ApproachEfficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesVerifiable decryption in the headMulti-key Homomorphic Proxy Re-EncryptionFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsMultikey Fully Homomorphic Encryption and ApplicationsAttacks on the Search RLWE Problem with Small ErrorsLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentOn error distributions in ring-based LWEMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedFully Homomorphic Encryption for Point NumbersDeterministic compression with uncertain priorsEnhancing Data Parallelism of Fully Homomorphic EncryptionLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policies




Cites Work




This page was built for publication: (Leveled) fully homomorphic encryption without bootstrapping