Multi-identity and Multi-key Leveled FHE from Learning with Errors

From MaRDI portal
Publication:3457088

DOI10.1007/978-3-662-48000-7_31zbMath1351.94033OpenAlexW2296488250MaRDI QIDQ3457088

Ciarán McGoldrick, Michael Clear

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_31




Related Items

Two-round adaptively secure multiparty computation from standard assumptionsMulti-key FHE from LWE, RevisitedTargeted Homomorphic Attribute-Based EncryptionFaster Gaussian sampling for trapdoor lattices with arbitrary modulusAn improved affine equivalence algorithm for random permutationsFrom FE combiners to secure MPC and backLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesMulti-key and multi-input predicate encryption from learning with errorsEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionMulti-key Homomorphic Proxy Re-EncryptionMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingScooby: improved multi-party homomorphic secret sharing based on FHEMultikey Fully Homomorphic Encryption and ApplicationsTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsMulti-input attribute based encryption and predicate encryptionUnnamed ItemBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsScooby: improved multi-party homomorphic secret sharing based on FHEMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNSecure MPC: laziness leads to GODMaliciously circuit-private multi-key FHE and MPC based on LWEMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWEChosen-Ciphertext Secure Fully Homomorphic EncryptionCircuit-Private Multi-key FHEPrivate Puncturable PRFs from Standard Lattice AssumptionsWatermarking cryptographic functionalities from standard lattice assumptionsPost-quantum multi-party computationMultiparty reusable non-interactive secure computation from LWEUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionSpooky Encryption and Its ApplicationsLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsBreaking the Circuit Size Barrier for Secure Computation Under DDHA new Gaussian sampling for trapdoor lattices with arbitrary modulusKeyed-fully homomorphic encryption without indistinguishability obfuscationTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSHomomorphic Encryption