On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption

From MaRDI portal
Publication:5415546

DOI10.1145/2213977.2214086zbMath1286.68114OpenAlexW2048994663MaRDI QIDQ5415546

Eran Tromer, Vinod Vaikuntanathan, Adriana López-Alt

Publication date: 13 May 2014

Published in: Proceedings of the forty-fourth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2213977.2214086




Related Items (95)

On the round complexity of secure quantum computationOn the deductive security of queries to confidential databases in cloud computing systemsA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsA trace map attack against special ring-LWE samplesAlgorithmic acceleration of B/FV-like somewhat homomorphic encryption for compute-enabled RAMHomomorphic Encryption StandardAnalysis of Gong et al.'s CCA2-secure homomorphic encryptionHomomorphic AES evaluation using the modified LTV schemeEnhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionFully Homomorphic Encryption with Auxiliary InputsBlending FHE-NTRU Keys – The Excalibur PropertyMulti-key FHE from LWE, RevisitedTargeted Homomorphic Attribute-Based EncryptionVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)Transciphering, using FiLIP and TFHE for an efficient delegation of computationConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsPrivacy Assurances in Multiple Data-Aggregation TransactionsVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsRound-optimal and communication-efficient multiparty computationAnonymity of NIST PQC round 3 KEMsIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsBootstrapping for helibCryptographic algorithms for privacy-preserving online applicationsDepth Optimized Efficient Homomorphic SortingPrivate Computation on Encrypted Genomic DataEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesMulti-key and multi-input predicate encryption from learning with errorsPrivacy-preserving multikey computing framework for encrypted data in the cloudFlattening NTRU for evaluation key free homomorphic encryptionCharacterizing overstretched NTRU attacksEfficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesSecure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVMMulti-key Homomorphic Proxy Re-EncryptionVerifiable Decryption for Fully Homomorphic EncryptionA polynomial time algorithm for breaking NTRU encryption with multiple keysmrNISC from LWE with polynomial modulusHomomorphic encryption: a mathematical surveyA homomorphic encryption scheme with adaptive chosen ciphertext security but without random oraclemrNISC from LWE with polynomial modulusFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingD-NTRU: more efficient and average-case IND-CPA secure NTRU variantMultikey Fully Homomorphic Encryption and ApplicationsMulti-input attribute based encryption and predicate encryptionMaliciously secure massively parallel computation for all-but-one corruptionsOn the hardness of the NTRU problemHomomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomialsA verifiable \((k,n)\)-threshold quantum secure multiparty summation protocolUnnamed ItemPrivacy preserving multi-party computation delegation for deep learning in cloud computingBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsSecurity considerations for Galois non-dual RLWE familiesPrivate AI: Machine Learning on Encrypted DataAttacks on the Search RLWE Problem with Small ErrorsSecure MPC: laziness leads to GODMaliciously circuit-private multi-key FHE and MPC based on LWEMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedProvably secure NTRUEncrypt over any cyclotomic fieldBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUA Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationTrusted computing with addition machines. IThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWECircuit-Private Multi-key FHEProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationCandidate iO from homomorphic encryption schemesA framework for cryptographic problems from linear algebraOn the deductive security of queries to databases with multi-bit recordsMulti-input Functional Encryption and Its Application in Outsourcing ComputationEfficient and secure outsourced approximate pattern matching protocolInteger Version of Ring-LWE and Its ApplicationsCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsPost-quantum multi-party computationMultiparty reusable non-interactive secure computation from LWEHigh-Precision Secure Computation of Satellite Collision ProbabilitiesThe Feasibility of Outsourced Database Search in the Plain ModelUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionSpooky Encryption and Its ApplicationsA Subfield Lattice Attack on Overstretched NTRU AssumptionsLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsBreaking the Circuit Size Barrier for Secure Computation Under DDHA new scale-invariant homomorphic encryption schemeVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsDynamic decentralized functional encryptionKeyed-fully homomorphic encryption without indistinguishability obfuscationAn optimized GHV-type HE scheme: simpler, faster, and more versatileTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSWorst-case to average-case reductions for module latticesHomomorphic Encryption


Uses Software



This page was built for publication: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption