Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages

From MaRDI portal
Publication:5199210

DOI10.1007/978-3-642-22792-9_29zbMath1290.94051OpenAlexW1494049356WikidataQ60895148 ScholiaQ60895148MaRDI QIDQ5199210

Zvika Brakerski, Vinod Vaikuntanathan

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_29




Related Items

Lattice-based key exchange on small integer solution problemEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyLattice-based certificateless encryption schemeError analysis of weak poly-LWE instancesSimilarity Based Interactive Private Information RetrievalA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesEnhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionTrapdoors for Ideal Lattices with ApplicationsBlending FHE-NTRU Keys – The Excalibur PropertyPredicate Encryption for Circuits from LWEProvably Weak Instances of Ring-LWEOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesApproximate homomorphic encryption with reduced approximation errorAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)Homomorphic lower digits removal and improved FHE bootstrappingHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataBootstrapping for approximate homomorphic encryptionSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionTightly secure ring-LWE based key encapsulation with short ciphertextsThe polynomial learning with errors problem and the smearing conditionAsymptotically quasi-optimal cryptographyHigh-precision bootstrapping for approximate homomorphic encryption by error variance minimizationSingle-server private information retrieval with sublinear amortized timePrivacy-preserving anomaly detection in cloud with lightweight homomorphic encryptionPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesCryptographic algorithms for privacy-preserving online applicationsOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemPrivate Computation on Encrypted Genomic DataEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesAugmented Learning with Errors: The Untapped Potential of the Error TermSecret computation of purchase history data using somewhat homomorphic encryptionFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSRinocchio: SNARKs for ring arithmeticA Homomorphic Proxy Re-encryption from LatticesEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionSolving LWR via BDD Strategy: Modulus Switching ApproachEfficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesMulti-key Homomorphic Proxy Re-EncryptionVerifiable Decryption for Fully Homomorphic EncryptionBatched fully homomorphic encryption from TFHEEvalRound algorithm in CKKS bootstrappingFINAL: faster FHE instantiated with NTRU and LWEMultikey Fully Homomorphic Encryption and ApplicationsRevisiting homomorphic encryption schemes for finite fieldsA survey on single server private information retrieval in a coding theory perspectiveReduction-free multiplication for finite fields and polynomial ringsEfficient lattice-based inner-product functional encryptionThe direction of updatable encryption does matterSecurity considerations for Galois non-dual RLWE familiesFinding and evaluating parameters for BGVLearning with physical rounding for linear and quadratic leakage functionsFast blind rotation for bootstrapping FHEsAttacks on the Search RLWE Problem with Small ErrorsSecure MPC: laziness leads to GODSLAP: simpler, improved private stream aggregation from ring learning with errorsLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentAn efficient quantum somewhat homomorphic symmetric searchable encryptionMaliciously circuit-private multi-key FHE and MPC based on LWEFully homomorphic SIMD operationsMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedCryptanalysis of a Homomorphic Encryption Scheme Over IntegersSecurity estimates of a ring-LWE symmetric cryptosystem against chosen plaintext attackEPiC: efficient privacy-preserving counting for MapReduceBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationCRT-based fully homomorphic encryption over the integersThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionPacked Ciphertexts in LWE-Based Homomorphic EncryptionSome security bounds for the key sizes of DGHV schemeCircuit-Private Multi-key FHEFHE over the Integers: Decomposed and Batched in the Post-Quantum RegimeShort Stickelberger Class Relations and Application to Ideal-SVP(Leveled) Fully Homomorphic Encryption without BootstrappingPrivacy-preserving verifiable delegation of polynomial and matrix functionsOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMEncoding of Rational Numbers and Their Homomorphic Computations for FHE-Based ApplicationsInteger Version of Ring-LWE and Its ApplicationsMulti-server verifiable delegation of computations: unconditional security and practical efficiencyCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsBatch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesBoosting verifiable computation on encrypted dataOn the security of homomorphic encryption on approximate numbersIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationLPPRS: new location privacy preserving schemes based on ring signature over mobile social networksPrivate Conjunctive Query over Encrypted DataProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsThe Geometry of Lattice CryptographyFlexible and efficient verifiable computation on encrypted dataFHE Circuit Privacy Almost for FreeLWE from non-commutative group ringsImproved Key Generation for Gentry’s Fully Homomorphic Encryption SchemeHow to Use Indistinguishability Obfuscation: Deniable Encryption, and MoreA new scale-invariant homomorphic encryption schemeAlgebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmEfficient pseudorandom correlation generators from ring-LPNKeyed-fully homomorphic encryption without indistinguishability obfuscationKey-homomorphic pseudorandom functions from LWE with small modulus


Uses Software