2014
DOI: 10.1109/cc.2014.6969773
|View full text |Cite
|
Sign up to set email alerts
|

A fully homomorphic encryption scheme with better key size

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Suppose ciphertext c i under the secret key S L is a fresh ciphertext for i∈{1,2}, namely, c i ←FHE.Enc(pk 1 , m i ). According to the analysis in [20]- [23], we get e mult 1 ∞ < 5(n 2 + t)BE, e mult 2 ∞ < (1/2)(n 2 + t) 2 B 2 and e t ∞ < (n 2 +t) 2 B+(1/2)n 2 B. Putting these together, we get the bound of noise magnitude after once homomorphic multiplication between two fresh ciphertexts such as…”
Section: Noise Analysismentioning
confidence: 96%
“…Suppose ciphertext c i under the secret key S L is a fresh ciphertext for i∈{1,2}, namely, c i ←FHE.Enc(pk 1 , m i ). According to the analysis in [20]- [23], we get e mult 1 ∞ < 5(n 2 + t)BE, e mult 2 ∞ < (1/2)(n 2 + t) 2 B 2 and e t ∞ < (n 2 +t) 2 B+(1/2)n 2 B. Putting these together, we get the bound of noise magnitude after once homomorphic multiplication between two fresh ciphertexts such as…”
Section: Noise Analysismentioning
confidence: 96%
“…Approximate eigenvector DGHV10 [26] CMNT11 [27] CNT12 [28] CCKM+13 [29] CLT14 [30] CS15 [31] BBL17 [32] BV11 [33] BGV12 [20] CWZS14 [35] CSZ16 [37] BLLN13 [38] CZ17 [42] CKKS17 [45] CHKK+18 [46] GSW13 [48] AP14 [49] DM15 [51] CGGI16 [52] KGV16 [53] BL14 [50] LGM16 [54] LMW17 [55] Bra12 [36] CCS19 [47] CH18 [44] Approximate greatest common divisor Figure 2. The development of fully homomorphic encryption.…”
Section: Relinearizationmentioning
confidence: 99%
“…It could execute one homomorphic multiplication without increasing the ciphertext size. Based on the assumption of binary LWE [ 34 ], Chen et al [ 35 ] proposed the CWZS14 FHE scheme, the concrete parameters of which are analyzed as follows. In this scheme, the secret key is generated from randomly, where l is the dimension.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Then some FHE schemes were proposed based on different mathematical hard problem. For example, the scheme is based on prime ideal [3], the schemes are based on integer [4][5][6] and the schemes are based on Learning with errors (LWE) or its ring variant (RLWE) [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%