2011
DOI: 10.1007/978-3-642-22792-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages

Abstract: Abstract. We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems on ideal lattices. We then transform it into a fully homomorphic encryption scheme using standard "squashing" and "bootstrapping" techniques introduced by Gentry (STOC 2009).One of the obstacles in going from "somewhat" to full homomorphism is the requirement that the somewhat homomorphic scheme be circular secure, namely, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
587
0
5

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 765 publications
(592 citation statements)
references
References 34 publications
(67 reference statements)
0
587
0
5
Order By: Relevance
“…In this paper, we continue the line of work of [LMSV12,ZPS12] to present key recovery attacks for the schemes [BV11b,BV11a,GSW13,Bra12]. Our attacks can also be applied to the SHE scheme in [BGV12].…”
Section: Our Contributionsmentioning
confidence: 80%
See 3 more Smart Citations
“…In this paper, we continue the line of work of [LMSV12,ZPS12] to present key recovery attacks for the schemes [BV11b,BV11a,GSW13,Bra12]. Our attacks can also be applied to the SHE scheme in [BGV12].…”
Section: Our Contributionsmentioning
confidence: 80%
“…The SHE scheme from [BGV12] is closely related to the SHE schemes from [BV11a,BV11b]. This implies that the attacks from Section 5.2 and 4.2 can be directly applied against the SHE scheme from [BGV12].…”
Section: Key Recovery Attack Against the Bgv12 Schemementioning
confidence: 98%
See 2 more Smart Citations
“…Starting with Gentry's mathematical breakthrough constructing the first plausible FHE scheme [22], [23], we have seen rapid development in the theory and implementation of homomorphic encryption (HE) schemes. HE schemes can now be based on a variety of cryptographic assumptions -approximate greatest common divisors [16], [18], learning with errors (LWE) [9], [10], [12], [25], and Ring-LWE (RLWE) [11], [24], [32].…”
Section: Introductionmentioning
confidence: 99%