Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
From MaRDI portal
Publication:3562913
DOI10.1007/978-3-642-13013-7_25zbMath1281.94055OpenAlexW1575598731WikidataQ28002578 ScholiaQ28002578MaRDI QIDQ3562913
Frederik Vercauteren, Nigel P. Smart
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_25
Related Items
On CCA-Secure Somewhat Homomorphic Encryption ⋮ Deniable fully homomorphic encryption from learning with errors ⋮ Polly cracker, revisited ⋮ Lattice Reduction for Modular Knapsack ⋮ Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm ⋮ Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\) ⋮ Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives ⋮ Cryptographic algorithms for privacy-preserving online applications ⋮ Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms ⋮ On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes ⋮ Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes ⋮ Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme ⋮ Verifiable Decryption for Fully Homomorphic Encryption ⋮ Computing primitive idempotents in finite commutative rings and applications ⋮ Multikey Fully Homomorphic Encryption and Applications ⋮ Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs ⋮ $$\mathsf {HIKE}$$ : Walking the Privacy Trail ⋮ Generating subgroups of ray class groups with small prime ideals ⋮ Group homomorphic encryption: characterizations, impossibility results, and applications ⋮ Fast blind rotation for bootstrapping FHEs ⋮ Fully homomorphic SIMD operations ⋮ Cryptanalysis of a Homomorphic Encryption Scheme Over Integers ⋮ Unsupervised Machine Learning on encrypted data ⋮ LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme ⋮ Secure Outsourced Computation ⋮ Benaloh’s Dense Probabilistic Encryption Revisited ⋮ Efficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based service ⋮ Cryptanalysis of a homomorphic encryption scheme ⋮ CRT-based fully homomorphic encryption over the integers ⋮ Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages ⋮ Security analysis of cryptosystems using short generators over ideal lattices ⋮ Some security bounds for the key sizes of DGHV scheme ⋮ Short Generators Without Quantum Computers: The Case of Multiquadratics ⋮ Computing Generator in Cyclotomic Integer Rings ⋮ Short Stickelberger Class Relations and Application to Ideal-SVP ⋮ Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges ⋮ On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in \(\mathbb{Q}(\zeta_{2^s})\) ⋮ On the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols ⋮ Short principal ideal problem in multicubic fields ⋮ CCA-Secure Keyed-Fully Homomorphic Encryption ⋮ Subexponential time relations in the class group of large degree number fields ⋮ Encrypted data processing with homomorphic re-encryption ⋮ Geometry of biquadratic and cyclic cubic log-unit lattices ⋮ TFHE: fast fully homomorphic encryption over the torus ⋮ Boosting verifiable computation on encrypted data ⋮ On the ideal shortest vector problem over random rational primes ⋮ The Geometry of Lattice Cryptography ⋮ Accelerating Homomorphic Computations on Rational Numbers ⋮ A novel fully homomorphic encryption scheme bsed on LWE ⋮ FHE Circuit Privacy Almost for Free ⋮ Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme ⋮ On Constructing Homomorphic Encryption Schemes from Coding Theory ⋮ Computing on authenticated data ⋮ Homomorphic Encryption ⋮ Subexponential class group and unit group computation in large degree number fields
Uses Software