(Leveled) Fully Homomorphic Encryption without Bootstrapping

From MaRDI portal
Publication:92720

DOI10.1145/2633600zbMath1347.68121OpenAlexW2177209050WikidataQ123151094 ScholiaQ123151094MaRDI QIDQ92720

Vinod Vaikuntanathan, Zvika Brakerski, Craig Gentry, Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan

Publication date: July 2014

Published in: ACM Transactions on Computation Theory (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2633600




Related Items (61)

Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyMhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKPDeniable fully homomorphic encryption from learning with errorsA trace map attack against special ring-LWE samplesOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationEnhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionProvably Weak Instances of Ring-LWEImproving the efficiency of AES protocols in multi-party computationFaster homomorphic encryption over GPGPUs via hierarchical DGTAn extension of Kannan's embedding for solving ring-based LWE problemsSurvey of information securityOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesApproximate homomorphic encryption with reduced approximation errorSecure multiparty computation with sublinear preprocessingHigh-precision bootstrapping for approximate homomorphic encryption by error variance minimizationPrivacy-preserving anomaly detection in cloud with lightweight homomorphic encryptionBootstrapping for helibPrivacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectivesAlgebraically structured LWE. RevisitedFrom FE combiners to secure MPC and backStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionBLEACH: cleaning errors in discrete computations over CKKSEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionMPClan: protocol suite for privacy-conscious computationsHomomorphic encryption: a mathematical surveyLarge-precision homomorphic sign evaluation using FHEW/TFHE bootstrappingPrivate join and compute from PIR with defaultBalanced non-adjacent formsRevisiting homomorphic encryption schemes for finite fieldsA multi-valued quantum fully homomorphic encryption schemeA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionThe direction of updatable encryption does matterBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsCoefficient grouping for complex affine layersHERMES: efficient ring packing using MLWE ciphertexts and application to transcipheringAccelerating HE operations from key decomposition techniqueToward practical lattice-based proof of knowledge from Hint-MLWEReductions from module lattices to free module lattices, and application to dequantizing module-LLLHRA-secure attribute-based threshold proxy re-encryption from latticesMaliciously secure matrix multiplication with applications to private deep learningSLAP: simpler, improved private stream aggregation from ring learning with errorsAn efficient threshold access-structure for RLWE-based multiparty homomorphic encryptionNew cryptanalysis of LowMC with algebraic techniquesUnnamed ItemFractional LWE: A Nonlinear Variant of LWEExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionTrusted computing with addition machines. IHomomorphicEncryptionA framework for cryptographic problems from linear algebraIntelligent cryptography approach for secure distributed big data storage in cloud computingLimits on the efficiency of (ring) LWE-based non-interactive key exchangeEfficient bootstrapping for approximate homomorphic encryption with non-sparse keysHigh-precision bootstrapping of RNS-CKKS homomorphic encryption using optimal minimax polynomial approximation and inverse sine functionOn the security of homomorphic encryption on approximate numbersAccelerating Homomorphic Computations on Rational NumbersLinear Overhead Optimally-Resilient Robust MPC Using PreprocessingQuantum Homomorphic Encryption for Polynomial-Sized CircuitsInteger polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sortingPractical post-quantum password-authenticated key exchange based-on module-latticeHomomorphic Encryption


Uses Software


Cites Work


This page was built for publication: (Leveled) Fully Homomorphic Encryption without Bootstrapping