2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2015
DOI: 10.1109/icassp.2015.7178262
|View full text |Cite
|
Sign up to set email alerts
|

Multivariate lattices for encrypted image processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(48 citation statements)
references
References 13 publications
0
48
0
Order By: Relevance
“…We particularize the NTT for its application to the cryptosystems presented in [7] and [13]. In that case, the cryptosystems require the use of a ring R q = Z q [z]/(1 + z n ), where q is prime, and n is a power of 2.…”
Section: Number Theoretic Transforms In Secure Signal Processingmentioning
confidence: 99%
See 4 more Smart Citations
“…We particularize the NTT for its application to the cryptosystems presented in [7] and [13]. In that case, the cryptosystems require the use of a ring R q = Z q [z]/(1 + z n ), where q is prime, and n is a power of 2.…”
Section: Number Theoretic Transforms In Secure Signal Processingmentioning
confidence: 99%
“…Along with the linear convolution, the circular or cyclic convolution is frequently used in signal processing. To implement a linear convolution with an RLWE cryptosystem [7], [30] and its extensions [13], we need a value of n large enough to store the result of the convolution. Moreover, the cyclic convolution poses additional problems as the modular function f (z) = 1+z n in the cryptosystem only allows for negacyclic convolutions [31].…”
Section: A Encrypted Cyclic Convolutionmentioning
confidence: 99%
See 3 more Smart Citations