2018
DOI: 10.1007/s00145-017-9273-9
|View full text |Cite
|
Sign up to set email alerts
|

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Abstract: In typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob's public key pk and to send the ciphertext c = HE pk (m) to some third-party evaluator Charlie. This paper specifically considers that first step, i.e. the problem of transmitting c as efficiently as possible from Alice to Charlie. As previously noted, a form of compression is achieved using hybrid encryption. Given a symmetric encryption scheme E, Alice picks a random key k and sends a mu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 69 publications
(30 citation statements)
references
References 62 publications
0
30
0
Order By: Relevance
“…On the other hand, computing an and gate requires a multiplication of the ciphertexts, and makes the noise growth noticeably larger [20]. This is why the cryptographic community introduced the simplified model of Section 1.1 and started building circuits for which the noise does not increase too much in this model [1,7].…”
Section: Discussion Of the Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, computing an and gate requires a multiplication of the ciphertexts, and makes the noise growth noticeably larger [20]. This is why the cryptographic community introduced the simplified model of Section 1.1 and started building circuits for which the noise does not increase too much in this model [1,7].…”
Section: Discussion Of the Modelmentioning
confidence: 99%
“…In this paper, we say that the noise level of a ciphertext is in [0, L], where L is the parameter of the FHE scheme. In previous works, the level was either in [1, max ] [24,29], or in [9, max ] [20], 7 where max = L + 1. This is equivalent: = 0 should not be interpreted to mean that a ciphertext is noise-free, but that the amount of noise the ciphertext contains results from a bootstrapping operation.…”
Section: Discussion Of the Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the seminal work of Gentry [11], introducing the first fully homomorphic encryption (FHE) many other simpler and more efficient schemes have been proposed [10], [6], [5]. The HE based solutions have been applied to secure outsourcing of computation that involves genome data.…”
Section: A Homomorphic Encryption Solutions For Genomic Computationsmentioning
confidence: 99%
“…Nowadays, the concept of biased inputs are used to analyze the cryptographic properties of some symmetric ciphers. For example, Maitra et al [15,16] analyzed the bias of Walsh-Hadamard transform of the filter function of FLIP [1,2] over a restricted domain where input vectors are not independent and identically distributed. They showed in Table IV [16,Section IV.A] that the bounds provided by the biased Walsh-Hadamard transforms are better than those obtained by Carlet et al [2].…”
Section: Introductionmentioning
confidence: 99%