2018
DOI: 10.1007/978-3-319-78381-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping for Approximate Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
138
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 205 publications
(159 citation statements)
references
References 36 publications
0
138
0
2
Order By: Relevance
“…plaintext bits in one slot, unlike the previous FHE methods [14,16]. Let the corresponding bit length be the word size.…”
Section: Heaan Heaan's Ciphertext Can Contain Multiplementioning
confidence: 99%
See 1 more Smart Citation
“…plaintext bits in one slot, unlike the previous FHE methods [14,16]. Let the corresponding bit length be the word size.…”
Section: Heaan Heaan's Ciphertext Can Contain Multiplementioning
confidence: 99%
“…However, they require a very large computation for floating-point operations. Also, as we mentioned in the previous section, HEAAN [14,16] has some limitation on representing encrypted floatingpoint numbers. Also, there has been no approach to represent encrypted floating-point numbers on top of TFHE [9,19].…”
Section: Related Workmentioning
confidence: 99%
“…基于 "错误学习" (learning with error, LWE) 的 FHE 方案和基于 NTRU (number theory research unit) 的 FHE 方案在层次型方案中 最具代表性, 其中基于 LWE 的方案被认为能够抵抗量子攻击 [119] . 典型的 LWE 方案包括 BV [126] , BGV [127] 和 GSW 方案 [128] 等. NTRU 方案的典型代表是 López-Alt 等 [84] [130] 、Bos 等 [131] [134] .…”
Section: 密文噪声的控制是实现全同态的关键问题 按照 Fhe 采用的噪声管理技术 当前的 Fhe 方案可unclassified
“…Gentry [Gentry, 2009] first proposed a Fully Homomorphic Encryption (FHE) scheme, which theoretically could compute any kind of arithmetic circuit, but is computationally intractable in practice. FHE evolved into more efficient schemes preserving addition and multiplication over encrypted data, such as BGV [Brakerski et al, 2011], FV [Fan and Vercauteren, 2012] or CKKS [Cheon et al, 2018], allowing approximations of multiplicative inverse, exponential and logistic function, or discrete Fourier transformation. Similar to asymmetric encryption, a public-private key pair (pub, priv) is generated.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%