Efficient Fully Homomorphic Encryption from (Standard) LWE

From MaRDI portal
Publication:5495009

DOI10.1109/FOCS.2011.12zbMath1292.94038MaRDI QIDQ5495009

Zvika Brakerski, Vinod Vaikuntanathan

Publication date: 30 July 2014

Published in: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryFully Homomorphic Encryption with Auxiliary InputsBlending FHE-NTRU Keys – The Excalibur PropertyTargeted Homomorphic Attribute-Based EncryptionOn the Efficacy of Solving LWE by Reduction to Unique-SVPSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionOn the Bottleneck Complexity of MPC with Correlated RandomnessFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSPrivacy-preserving blueprintsBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusAlgebraic restriction codes and their applicationsSolving LWR via BDD Strategy: Modulus Switching ApproachMulti-key Homomorphic Proxy Re-EncryptionVerifiable Decryption for Fully Homomorphic EncryptionBatched fully homomorphic encryption from TFHEBounded functional encryption for Turing machines: adaptive security from general assumptionsFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingComputing primitive idempotents in finite commutative rings and applicationsMultikey Fully Homomorphic Encryption and ApplicationsLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingStatistically sender-private OT from LPN and derandomizationPost-quantum insecurity from LWEQuantum search-to-decision reduction for the LWE problemMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNHow to use (plain) witness encryption: registered ABE, flexible broadcast, and moreCryptography with certified deletionError correction and ciphertext quantization in lattice cryptographyPrivate AI: Machine Learning on Encrypted DataHardness of (M)LWE with semi-uniform seedsLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentUnnamed ItemDeterministic compression with uncertain priorsLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsBoolean Functions for Homomorphic-Friendly Stream CiphersFractional LWE: A Nonlinear Variant of LWEPacked Ciphertexts in LWE-Based Homomorphic EncryptionImproved (Hierarchical) Inner-Product Encryption from LatticesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESChosen-Ciphertext Secure Fully Homomorphic EncryptionFHE over the Integers: Decomposed and Batched in the Post-Quantum RegimeSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsUnnamed ItemLimits of local algorithms over sparse random graphsWatermarking cryptographic functionalities from standard lattice assumptionsImproved learning of \(k\)-paritiesTowards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group TheoryGarbled Circuits as Randomized Encodings of Functions: a PrimerThe Complexity of Public-Key CryptographySome Open Problems in Information-Theoretic CryptographyLattice-Based SNARGs and Their Application to More Efficient ObfuscationRound efficient secure multiparty quantum computation with identifiable abortLattice-based key exchange on small integer solution problemOn the deductive security of queries to confidential databases in cloud computing systemsCounterexamples to new circular security assumptions underlying iOLarge message homomorphic secret sharing from DCR and applicationsPolly cracker, revisitedSuccinct non-interactive arguments via linear interactive proofsLattice-based certificateless encryption schemeDoes Fiat-Shamir require a cryptographic hash function?Transciphering, using FiLIP and TFHE for an efficient delegation of computationConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsPractical private-key fully homomorphic encryption in ringsHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataBootstrapping for approximate homomorphic encryptionTightly secure ring-LWE based key encapsulation with short ciphertextsGarbled circuits with sublinear evaluatorAsymptotically quasi-optimal cryptographyBatch-OT with optimal rateQuantum algorithms for variants of average-case lattice problems via filtering




This page was built for publication: Efficient Fully Homomorphic Encryption from (Standard) LWE