2015
DOI: 10.1007/s10623-015-0095-1
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic AES evaluation using the modified LTV scheme

Abstract: Since its introduction more than a decade ago the homomorphic properties of the NTRU encryption scheme have gone largely ignored. A variant of NTRU proposed by Stehlé and Steinfeld was recently extended into a full fledged multi-key fully homomorphic encryption scheme by López-Alt, Tromer and Vaikuntanathan (LTV). This NTRU based FHE presents a viable alternative to the currently dominant BGV style FHE schemes. While the scheme appears to be more efficient, a full implementation and comparison to BGV style imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
41
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(41 citation statements)
references
References 26 publications
0
41
0
Order By: Relevance
“…The various schemes have been used/defined in various papers: for example one can find BGV in [3,8,9], FV in [6], NTRU in [5,14] and YASHE in [1]. In all four schemes we shall use a chain of moduli for our homomorphic evaluation 2 by choosing L "small primes"…”
Section: Ring Based She Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…The various schemes have been used/defined in various papers: for example one can find BGV in [3,8,9], FV in [6], NTRU in [5,14] and YASHE in [1]. In all four schemes we shall use a chain of moduli for our homomorphic evaluation 2 by choosing L "small primes"…”
Section: Ring Based She Schemesmentioning
confidence: 99%
“…In addition not all papers utilize all optimizations and improvements available. For example papers on the NTRU scheme [5,14], and its scale invariant version YASHE [1], rarely, if at all, make mention of the use of SIMD techniques. Papers working on scale invariant systems [6,1] usually focus on plaintext moduli of two, and discount larger moduli.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Lastly, the authors advocate use of the Chinese Remainder Theorem on the message space to improve the flexibility of the scheme. In [15] Doröz, Hu and Sunar propose another implementation based on the ATV scheme [10]. Similar to earlier proposals the implementation is batched, bit-sliced and features modulus switching techniques.…”
Section: Introductionmentioning
confidence: 99%
“…-we present a leveled homomorphic implementation of the Prince cipher. Our implementation makes use of the NTRU based library developed by Doröz, Hu and Sunar [15]. Specifically, we optimize the Prince cipher for shallow circuit implementation, and based on the depth characteristics, chose optimal but secure parameters for the library to evaluate Prince efficiently.…”
Section: Introductionmentioning
confidence: 99%