Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$

From MaRDI portal
Publication:5494940

DOI10.1137/120868669zbMath1302.94037OpenAlexW1979120705WikidataQ121632039 ScholiaQ121632039MaRDI QIDQ5494940

Vinod Vaikuntanathan, Zvika Brakerski

Publication date: 30 July 2014

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/120868669




Related Items (61)

Identity-based re-encryption scheme with lightweight re-encryption key generationOn the hardness of module-LWE with binary secretDeniable fully homomorphic encryption from learning with errorsFine-grained secure computationPrivacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic EncryptionAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesSurvey of information securityHomomorphic lower digits removal and improved FHE bootstrappingHigh-precision bootstrapping for approximate homomorphic encryption by error variance minimizationToward non-interactive zero-knowledge proofs for NP from LWEPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesTowards a Simpler Lattice Gadget ToolkitFully homomorphic NIZK and NIWI proofsCompressible FHE with applications to PIRCryptographic algorithms for privacy-preserving online applicationsSample-size-reduction of quantum states for the noisy linear problemAchievable \textsf{CCA2} relaxation for homomorphic encryptionComputational fuzzy extractor from LWEHomomorphic encryption: a mathematical surveyEvalRound algorithm in CKKS bootstrappingOn the measurement and simulation of the BKZ behavior for \(q\)-ary latticesDifferentially private naive Bayes learning over multiple data sourcesBalanced non-adjacent formsA survey on single server private information retrieval in a coding theory perspectiveA multi-valued quantum fully homomorphic encryption scheme$$\mathsf {HIKE}$$ : Walking the Privacy TrailThe direction of updatable encryption does matterSecurity considerations for Galois non-dual RLWE familiesFast blind rotation for bootstrapping FHEsMathematics of computation through the lens of linear equations and latticesAttacks on the Search RLWE Problem with Small ErrorsTowards classical hardness of module-LWE: the linear rank caseAn efficient quantum somewhat homomorphic symmetric searchable encryptionReduced memory meet-in-the-middle attack against the NTRU private keyFoundations of Homomorphic Secret SharingRing Packing and Amortized FHEW BootstrappingStructure Versus Hardness Through the Obfuscation LensTrusted computing with addition machines. IHow to securely outsource the extended Euclidean algorithm for large-scale polynomials over finite fieldsA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWEPrivate Puncturable PRFs from Standard Lattice AssumptionsAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsLinearly Homomorphic Encryption from $$\mathsf {DDH}$$Lower Bounds on Assumptions Behind Indistinguishability ObfuscationVerifying quantum computations at scale: A cryptographic leash on quantum devicesPractical Techniques Building on Encryption for Protecting and Managing Data in the CloudVerifiable single-server private information retrieval from LWE with binary errorsClassical Homomorphic Encryption for Quantum CircuitsClassical Homomorphic Encryption for Quantum CircuitsOn the security of homomorphic encryption on approximate numbersA novel fully homomorphic encryption scheme bsed on LWEQuantum Homomorphic Encryption for Polynomial-Sized CircuitsSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsHow to Prove Knowledge of Small SecretsBreaking the Circuit Size Barrier for Secure Computation Under DDHAn optimized GHV-type HE scheme: simpler, faster, and more versatileUnnamed ItemA tight parallel repetition theorem for partially simulatable interactive arguments via smooth KL-divergenceHomomorphic EncryptionWeak Zero-Knowledge beyond the Black-Box Barrier




This page was built for publication: Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$