Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
From MaRDI portal
Publication:2870084
DOI10.1007/978-3-642-45239-0_4zbMath1317.94088OpenAlexW2233194383MaRDI QIDQ2870084
Jake Loftus, Joppe W. Bos, Michael Naehrig, Kristin E. Lauter
Publication date: 17 January 2014
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: http://eprint.iacr.org/2013/075
Related Items (39)
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service ⋮ Towards faster polynomial-time lattice reduction ⋮ Error analysis of weak poly-LWE instances ⋮ Homomorphic AES evaluation using the modified LTV scheme ⋮ Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption ⋮ Blending FHE-NTRU Keys – The Excalibur Property ⋮ Homomorphic lower digits removal and improved FHE bootstrapping ⋮ Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ Bootstrapping for approximate homomorphic encryption ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Depth Optimized Efficient Homomorphic Sorting ⋮ Private Computation on Encrypted Genomic Data ⋮ Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms ⋮ Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes ⋮ NTRU Fatigue: How Stretched is Overstretched? ⋮ Flattening NTRU for evaluation key free homomorphic encryption ⋮ A polynomial time algorithm for breaking NTRU encryption with multiple keys ⋮ FINAL: faster FHE instantiated with NTRU and LWE ⋮ Multikey Fully Homomorphic Encryption and Applications ⋮ A full RNS variant of FV like somewhat homomorphic encryption schemes ⋮ Security considerations for Galois non-dual RLWE families ⋮ Private AI: Machine Learning on Encrypted Data ⋮ Attacks on the Search RLWE Problem with Small Errors ⋮ Fully Homomorphic Encryption for Point Numbers ⋮ Provably secure NTRUEncrypt over any cyclotomic field ⋮ A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Efficient reductions in cyclotomic rings -- application to Ring LWE based FHE schemes ⋮ The polynomial approximate common divisor problem and its application to the fully homomorphic encryption ⋮ Provably Secure NTRU Instances over Prime Cyclotomic Rings ⋮ Revisiting Lattice Attacks on Overstretched NTRU Parameters ⋮ On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL ⋮ Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges ⋮ Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices ⋮ Encoding of Rational Numbers and Their Homomorphic Computations for FHE-Based Applications ⋮ Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling ⋮ A Subfield Lattice Attack on Overstretched NTRU Assumptions ⋮ A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data ⋮ Homomorphic Encryption
Uses Software
This page was built for publication: Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme