2022
DOI: 10.21203/rs.3.rs-2018739/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Implementations of Homomorphic Encryption Schemes

Abstract: With the increased need for data confidentiality in various applications of our daily life, homomorphic encryption (HE) has emerged as a promising cryptographic topic. HE enables to perform computations directly on encrypted data (ciphertexts) without decryption in advance. Since the results of calculations remain encrypted and can only be decrypted by the data owner, confidentiality is guaranteed and any third party can operate on ciphertexts without access to decrypted data (plaintexts). Applying a homomorph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 37 publications
(33 reference statements)
0
5
0
Order By: Relevance
“…BFV also has better performance when compared to Paillier. We considered a 128-bit security level parameter, as stated in [ 54 ], to compare both aforesaid algorithms, then we extrapolated it to our database to obtain a metric and compare the models. We show the result in Figure 6 .…”
Section: Resultsmentioning
confidence: 99%
“…BFV also has better performance when compared to Paillier. We considered a 128-bit security level parameter, as stated in [ 54 ], to compare both aforesaid algorithms, then we extrapolated it to our database to obtain a metric and compare the models. We show the result in Figure 6 .…”
Section: Resultsmentioning
confidence: 99%
“…Most relevant to our work, they conclude that CKKS homomorphic multiplication is best implemented by PALISADE at smaller parameters, but that SEAL performs better at larger parameters. Doan et al [9] survey many different fully and partially homomorphic encryption schemes. Their survey covers many aspects, such as theoretical capabilities and limits, security differences, and performance comparison.…”
Section: Work Profiling Ckksmentioning
confidence: 99%
“…This approach to parameter selection allows us to fairly evaluate library performance in a wide range of circumstances without the tedious manual selection of parameters. Other works [8,9] assign CKKS parameters (e.g., N , |q|) directly and force the libraries to adhere to these; we instead allow libraries to select their own parameters. We give the parameters for leveled CKKS that each library chooses in Table 2.…”
Section: Parameter Selectionmentioning
confidence: 99%
See 2 more Smart Citations