Proceedings of the 3rd Innovations in Theoretical Computer Science Conference 2012
DOI: 10.1145/2090236.2090262
|View full text |Cite
|
Sign up to set email alerts
|

(Leveled) fully homomorphic encryption without bootstrapping

Abstract: We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual contribution in our work is a new way of constructing leveled fully homomorphic encryption schemes (capable of evaluating arbitrary polynomial-size circuits), without Gentry's bootstrapping procedure.Specifically, we offer a choice of FHE schemes based on the learning with error (LWE) or Ring LWE (RLWE) problems that have 2 λ security against kn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
727
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 1,199 publications
(729 citation statements)
references
References 17 publications
1
727
0
1
Order By: Relevance
“…For example consider (1), the noise grows to O(B · vn log q · |S|) in the worst case, or O(B · vn log q|S|) in the typical case. This is in contrast to O(B · (n log q) log v |S|) when using the Brakerski-GentryVaikuntanathan [9] encryption scheme, implemented in IBM HElib. Indeed, such expressions, as in (1), are far from atypical -they occur quite naturally in evaluating decision trees and PIR-like functions as will be discussed in Section 5.…”
Section: Better Error In Homomorphic Multiplicationmentioning
confidence: 92%
See 3 more Smart Citations
“…For example consider (1), the noise grows to O(B · vn log q · |S|) in the worst case, or O(B · vn log q|S|) in the typical case. This is in contrast to O(B · (n log q) log v |S|) when using the Brakerski-GentryVaikuntanathan [9] encryption scheme, implemented in IBM HElib. Indeed, such expressions, as in (1), are far from atypical -they occur quite naturally in evaluating decision trees and PIR-like functions as will be discussed in Section 5.…”
Section: Better Error In Homomorphic Multiplicationmentioning
confidence: 92%
“…Previous constructions of RLWE-based FHE schemes include [9], [10], [24]. One of the drawbacks of these schemes is the need to maintain a so-called "modulus chain" which increases the size of the prime number and consequently increases the ring dimension for the same security level.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The first fully homomorphic encryption [1], [2] scheme developed by C. Gentry make it possible to perform arbitrary computation over outsourced data at the same time the privacy of the outsourced data is kept. After C. Gentry's construction, many full homomorphic encryption schemes have been developed [3]- [10].…”
Section: Introductionmentioning
confidence: 99%