Fully homomorphic encryption using ideal lattices

From MaRDI portal
Revision as of 15:43, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5172710

DOI10.1145/1536414.1536440zbMath1304.94059OpenAlexW2031533839WikidataQ57484389 ScholiaQ57484389MaRDI QIDQ5172710

Craig Gentry

Publication date: 4 February 2015

Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1536414.1536440




Related Items (only showing first 100 items - show all)

Public Key Encryption with Flexible Pattern MatchingLattice Sieving via Quantum Random WalksSublinear-communication secure multiparty computation does not require FHEPrivacy-preserving blueprintsOn polynomial functions Modulo \(p^e\) and faster bootstrapping for homomorphic encryptionBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusBatch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortizationEfficient laconic cryptography from learning with errorsAlgebraic restriction codes and their applicationsDiscretization error reduction for high precision torus fully homomorphic encryptionBLEACH: cleaning errors in discrete computations over CKKSOptimisations and tradeoffs for HElibConstrained pseudorandom functions from homomorphic secret sharingUnidirectional updatable encryption and proxy re-encryption from DDHBackward-leak uni-directional updatable encryption from (homomorphic) public key encryptionOblivious message retrievalLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Some easy instances of ideal-SVP and implications on the partial Vandermonde knapsack problemEfficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesMulti-key Homomorphic Proxy Re-EncryptionVerifiable Decryption for Fully Homomorphic EncryptionLighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryptionMixed-technique multi-party computations composed of two-party computationsAn efficient encoding mechanism against eavesdropper with side channel informationBatched fully homomorphic encryption from TFHEKDM security for the Fujisaki-Okamoto transformations in the QROMAchievable \textsf{CCA2} relaxation for homomorphic encryptionSublinear secure computation from new assumptionsHomomorphic encryption: a mathematical surveymrNISC from LWE with polynomial modulusEvalRound algorithm in CKKS bootstrappingFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerMyOPE: malicious security for oblivious polynomial evaluationEfficient searchable symmetric encryption for join queriesOptimal single-server private information retrievalHow to compress encrypted dataFast practical lattice reduction through iterated compressionGeneric constructions of master-key KDM secure attribute-based encryptionComputing primitive idempotents in finite commutative rings and applicationsMaliciously secure massively parallel computation for all-but-one corruptionsHomomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomialsPrivate join and compute from PIR with defaultEfficient Boolean search over encrypted data with reduced leakageRevisiting homomorphic encryption schemes for finite fieldsTransciphering framework for approximate homomorphic encryptionImproved programmable bootstrapping with larger precision and efficient arithmetic circuits for TFHETime-release cryptography from minimal circuit assumptionsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?$$\mathsf {HIKE}$$ : Walking the Privacy TrailLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingA survey on functional encryptionStatistically sender-private OT from LPN and derandomizationLockable obfuscation from circularly insecure fully homomorphic encryptionThe direction of updatable encryption does matterPost-quantum insecurity from LWESteganography-free zero-knowledgeBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsLocal differential privacy for federated learningEfficient circuits for permuting and mapping packed values across leveled homomorphic ciphertextsPractical multi-party quantum homomorphic encryptionTwo-round quantum homomorphic encryption scheme based on matrix decompositionLattice-based cryptography: a surveyFully homomorphic encryption scheme and Fermat’s little theoremFinding and evaluating parameters for BGVMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNLearning with physical rounding for linear and quadratic leakage functionsCoefficient grouping for complex affine layersFast blind rotation for bootstrapping FHEsUnnamed ItemUnnamed ItemDeterministic compression with uncertain priorsTinyKeys: a new approach to efficient multi-party computationActively secure garbled circuits with constant communication overhead in the plain modelAn optimal distributed discrete log protocol with applications to homomorphic secret sharingFHE over the Integers: Decomposed and Batched in the Post-Quantum RegimeBetter Two-Round Adaptive Multi-party ComputationSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesProvably Secure NTRU Instances over Prime Cyclotomic RingsShort Generators Without Quantum Computers: The Case of MultiquadraticsComputing Generator in Cyclotomic Integer RingsGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationCryptography with UpdatesAn Overview of the State-of-the-Art of Cloud Computing Cyber-SecuritySomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsCandidate iO from homomorphic encryption schemesThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscationMinicrypt primitives with algebraic structure and applicationsAdaptively secure MPC with sublinear communication complexityClassical Homomorphic Encryption for Quantum CircuitsOutsourcing Medical Dataset Analysis: A Possible SolutionTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSCompact ring signatures from learning with errors







This page was built for publication: Fully homomorphic encryption using ideal lattices