Lattice-based fully dynamic multi-key FHE with short ciphertexts
From MaRDI portal
Publication:2835588
Recommendations
Cites work
- scientific article; zbMATH DE number 1024063 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A hierarchy of polynomial time lattice basis reduction algorithms
- Advances in cryptology -- CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17--21, 2014. Proceedings, Part I
- Algorithms in HElib
- Bootstrapping for HElib
- Bounded-width polynomial-size branching programs recognize exactly those languages in \(NC^ 1\)
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Faster Bootstrapping with Polynomial Error
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Lattice-based FHE as secure as PKE
- Multi-identity and multi-key leveled FHE from learning with errors
- Multi-key FHE from LWE, revisited
- On lattices, learning with errors, random linear codes, and cryptography
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Pseudorandom knapsacks and the sample complexity of LWE search-to-decision reductions
- Public-key cryptosystems from the worst-case shortest vector problem
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Two round multiparty computation via multi-key FHE
- \(i\)-hop homomorphic encryption and rerandomizable Yao circuits
Cited in
(24)- Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping
- Multi-key Homomorphic Proxy Re-Encryption
- TFHE: fast fully homomorphic encryption over the torus
- Three-round secure multiparty computation from black-box two-round oblivious transfer
- Dynamic multi target homomorphic attribute-based encryption
- Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
- Two-round adaptively secure multiparty computation from standard assumptions
- Multi-key FHE from LWE, revisited
- CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes
- Private puncturable PRFs from standard lattice assumptions
- Batched fully dynamic multi-key FHE from FHEW-like cryptosystems
- Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
- Maliciously secure massively parallel computation for all-but-one corruptions
- The bottleneck complexity of secure multiparty computation
- Multi-key fully-homomorphic encryption in the plain model
- Multiparty reusable non-interactive secure computation from LWE
- Secure software leasing
- From FE combiners to secure MPC and back
- BETA: biometric-enabled threshold authentication
- Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension
- Multikey fully homomorphic encryption and applications
- Maliciously circuit-private multi-key FHE and MPC based on LWE
- Targeted homomorphic attribute-based encryption
- A practical TFHE-based multi-key homomorphic encryption with linear complexity and low noise growth
This page was built for publication: Lattice-based fully dynamic multi-key FHE with short ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835588)