Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers

From MaRDI portal
Publication:2894423


DOI10.1007/978-3-642-29011-4_27zbMath1297.94062WikidataQ28002956 ScholiaQ28002956MaRDI QIDQ2894423

David Naccache, Jean-Sébastien Coron, Mehdi Tibouchi

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_27


94A60: Cryptography


Related Items

Multikey Fully Homomorphic Encryption and Applications, New Ideas to Build Noise-Free Homomorphic Cryptosystems, An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers, FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime, LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE, Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges, Polly cracker, revisited, Efficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based service, Cryptanalysis of a homomorphic encryption scheme, A new scale-invariant homomorphic encryption scheme, Unsupervised Machine Learning on encrypted data, CRT-based fully homomorphic encryption over the integers, The polynomial approximate common divisor problem and its application to the fully homomorphic encryption, Algorithms for CRT-variant of approximate greatest common divisor problem, Bootstrapping fully homomorphic encryption over the integers in less than one second, Efficient homomorphic conversion between (ring) LWE ciphertexts, Revisiting orthogonal lattice attacks on approximate common divisor problems, Towards faster polynomial-time lattice reduction, Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction, Flattening NTRU for evaluation key free homomorphic encryption, Multi-user security bound for filter permutators in the random oracle model, Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem, Bootstrapping for helib, Cryptographic algorithms for privacy-preserving online applications, Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud, Accelerating Homomorphic Computations on Rational Numbers, A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation, On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes, Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes, Efficient and Provable White-Box Primitives, Cryptanalysis of a Homomorphic Encryption Scheme Over Integers, Cryptanalysis of the Co-ACD Assumption


Uses Software