A Comparison of the Homomorphic Encryption Schemes FV and YASHE

From MaRDI portal
Revision as of 09:20, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4981776

DOI10.1007/978-3-319-06734-6_20zbMath1318.94071OpenAlexW87154849MaRDI QIDQ4981776

Tancrède Lepoint, Michael Naehrig

Publication date: 24 June 2014

Published in: Progress in Cryptology – AFRICACRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-06734-6_20




Related Items (20)

Homomorphic AES evaluation using the modified LTV schemeEnhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionTransciphering, using FiLIP and TFHE for an efficient delegation of computation\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionPrivate Computation on Encrypted Genomic DataFlattening NTRU for evaluation key free homomorphic encryptionRevisiting homomorphic encryption schemes for finite fieldsTransciphering framework for approximate homomorphic encryptionA full RNS variant of FV like somewhat homomorphic encryption schemesFully Homomorphic Encryption for Point NumbersEnhancing Data Parallelism of Fully Homomorphic EncryptionStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionRevisiting Lattice Attacks on Overstretched NTRU ParametersOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesHomomorphic Evaluation of Lattice-Based Symmetric Encryption SchemesA Subfield Lattice Attack on Overstretched NTRU AssumptionsA novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data


Uses Software






This page was built for publication: A Comparison of the Homomorphic Encryption Schemes FV and YASHE