Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme

From MaRDI portal
Publication:2870084

DOI10.1007/978-3-642-45239-0_4zbMath1317.94088OpenAlexW2233194383MaRDI QIDQ2870084

Jake Loftus, Joppe W. Bos, Michael Naehrig, Kristin E. Lauter

Publication date: 17 January 2014

Published in: Cryptography and Coding (Search for Journal in Brave)

Full work available at URL: http://eprint.iacr.org/2013/075




Related Items (39)

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a ServiceTowards faster polynomial-time lattice reductionError analysis of weak poly-LWE instancesHomomorphic AES evaluation using the modified LTV schemeEnhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionBlending FHE-NTRU Keys – The Excalibur PropertyHomomorphic lower digits removal and improved FHE bootstrappingHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataBootstrapping for approximate homomorphic encryptionStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionDepth Optimized Efficient Homomorphic SortingPrivate Computation on Encrypted Genomic DataEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesNTRU Fatigue: How Stretched is Overstretched?Flattening NTRU for evaluation key free homomorphic encryptionA polynomial time algorithm for breaking NTRU encryption with multiple keysFINAL: faster FHE instantiated with NTRU and LWEMultikey Fully Homomorphic Encryption and ApplicationsA full RNS variant of FV like somewhat homomorphic encryption schemesSecurity considerations for Galois non-dual RLWE familiesPrivate AI: Machine Learning on Encrypted DataAttacks on the Search RLWE Problem with Small ErrorsFully Homomorphic Encryption for Point NumbersProvably secure NTRUEncrypt over any cyclotomic fieldA Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationEfficient reductions in cyclotomic rings -- application to Ring LWE based FHE schemesThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesEncoding of Rational Numbers and Their Homomorphic Computations for FHE-Based ApplicationsPrivacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data HandlingA Subfield Lattice Attack on Overstretched NTRU AssumptionsA novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health dataHomomorphic Encryption


Uses Software



This page was built for publication: Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme