(Leveled) fully homomorphic encryption without bootstrapping
From MaRDI portal
Recommendations
- (Leveled) fully homomorphic encryption without bootstrapping
- Efficient fully homomorphic encryption from (standard) LWE
- Fully homomorphic encryption using ideal lattices
- FHEW: bootstrapping homomorphic encryption in less than a second
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
Cites work
- A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations
- A hierarchy of polynomial time lattice basis reduction algorithms
- A sieve algorithm for the shortest lattice vector problem
- Additively homomorphic encryption with \(d\)-operand multiplications
- Better bootstrapping in fully homomorphic encryption
- Bootstrapping for HElib
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Evaluating Branching Programs on Encrypted Data
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Faster fully homomorphic encryption
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption over the integers with shorter public keys
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption with polylog overhead
- Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
- Homomorphic evaluation of the AES circuit
- Implementing Gentry's fully-homomorphic encryption scheme
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- Probabilistic encryption
- Public-key cryptosystems from the worst-case shortest vector problem
- Ring switching in BGV-style homomorphic encryption
- Theory of Cryptography
- \(i\)-hop homomorphic encryption and rerandomizable Yao circuits
Cited in
(only showing first 100 items - show all)- A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
- Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption
- Homomorphic evaluation of lattice-based symmetric encryption schemes
- Private join and compute from PIR with default
- Fractional LWE: a nonlinear variant of LWE
- Coefficient grouping for complex affine layers
- The direction of updatable encryption does matter
- Attribute based encryption for Turing machines from lattices
- How to construct quantum FHE, generically
- On the practical \(\mathrm{CPA}^D\) security of ``exact and threshold FHE schemes and libraries
- Plaintext-ciphertext matrix multiplication and FHE bootstrapping: fast and fused
- A novel fully homomorphic encryption scheme bsed on LWE
- Verification protocol for stable matching from conditional disclosure of secrets
- Deniable cryptosystems: simpler constructions and achieving leakage resilience
- Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE
- Amortized functional bootstrapping in less than 7 ms, with \(\widetilde{O}(1)\) polynomial multiplications
- On the SVP for low-dimensional circulant lattices
- Too many hints -- when LLL breaks LWE
- MPClan: protocol suite for privacy-conscious computations
- Linear overhead optimally-resilient robust MPC using preprocessing
- Large-precision homomorphic sign evaluation using FHEW/TFHE bootstrapping
- Full domain functional bootstrapping with least significant bit encoding
- Algebraically structured LWE, revisited
- Simple threshold (fully homomorphic) encryption from LWE with polynomial modulus
- Faster amortized FHEW bootstrapping using ring automorphisms
- Differential privacy for free? Harnessing the noise in approximate homomorphic encryption
- Accelerating BGV bootstrapping for large \(p\) using null polynomials over \(\mathbb{Z}_{p^e} \)
- SoK: learning with errors, circular security, and fully homomorphic encryption
- Circuit bootstrapping: faster and smaller
- Towards practical multi-key TFHE: parallelizable, key-compatible, quasi-linear complexity
- Attacking a levelled fully homomorphic encryption system with topological data analysis
- An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption
- New cryptanalysis of LowMC with algebraic techniques
- An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers
- Batched fully dynamic multi-key FHE from FHEW-like cryptosystems
- Analysis and prevention of averaging attacks against obfuscation protocols
- Shift-type homomorphic encryption and its application to fully homomorphic encryption
- Bootstrappable identity-based fully homomorphic encryption
- Cryptanalysis of Enhanced MORE
- Homomorphic encryption: a mathematical survey
- SLAP: simpler, improved private stream aggregation from ring learning with errors
- Accelerating HE operations from key decomposition technique
- HERMES: efficient ring packing using MLWE ciphertexts and application to transciphering
- Reductions from module lattices to free module lattices, and application to dequantizing module-LLL
- Toward practical lattice-based proof of knowledge from Hint-MLWE
- Fully homomorphic encryption with auxiliary inputs
- HRA-secure attribute-based threshold proxy re-encryption from lattices
- BLEACH: cleaning errors in discrete computations over CKKS
- LWE-based FHE with better parameters
- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
- A multi-valued quantum fully homomorphic encryption scheme
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
- TFHE: fast fully homomorphic encryption over the torus
- On the security of homomorphic encryption on approximate numbers
- Practical post-quantum password-authenticated key exchange based-on module-lattice
- Provably weak instances of Ring-LWE
- FHE circuit privacy almost for free
- Maliciously secure matrix multiplication with applications to private deep learning
- Bootstrapping for helib
- Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives
- Breaking fully-homomorphic-encryption challenges. (Abstract)
- Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys
- High-precision bootstrapping of RNS-CKKS homomorphic encryption using optimal minimax polynomial approximation and inverse sine function
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- From FE combiners to secure MPC and back
- Homomorphic encryption
- Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles
- Fully homomorphic encryption using ideal lattices
- Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting
- Approximate homomorphic encryption with reduced approximation error
- Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise
- Accelerating homomorphic computations on rational numbers
- Optimization of bootstrapping in circuits
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- Trusted computing with addition machines. I
- Lattice-based FHE as secure as PKE
- Fully homomorphic encryption from approximate ideal lattices
- Revisiting homomorphic encryption schemes for finite fields
- Balanced non-adjacent forms
- On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes
- Towards constructing fully homomorphic encryption without ciphertext noise from group theory
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- Intelligent cryptography approach for secure distributed big data storage in cloud computing
- Survey of information security
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Algebraically structured LWE. Revisited
- Improved security for a ring-based fully homomorphic encryption scheme
- Multi-bit leveled homomorphic encryption via dual LWE-based
- On non-black-box simulation and the impossibility of approximate obfuscation
- An extension of Kannan's embedding for solving ring-based LWE problems
- Flattening NTRU for evaluation key free homomorphic encryption
- HomomorphicEncryption
- Deniable fully homomorphic encryption from learning with errors
- Mhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKP
- A trace map attack against special ring-LWE samples
- Faster fully homomorphic encryption
- Leveled FHE with matrix message space
This page was built for publication: (Leveled) fully homomorphic encryption without bootstrapping
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q92720)