Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE

From MaRDI portal
Publication:2412880

DOI10.1007/978-3-319-70694-8_14zbMath1420.94052OpenAlexW2768505000MaRDI QIDQ2412880

Ilaria Chillotti, Mariya Georgieva, Nicolas Gama, Malika Izabachène

Publication date: 6 April 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70694-8_14




Related Items

Transciphering, using FiLIP and TFHE for an efficient delegation of computationOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesHomomorphic lower digits removal and improved FHE bootstrappingBootstrapping for approximate homomorphic encryptionHigh-precision bootstrapping for approximate homomorphic encryption by error variance minimizationField instruction multiple dataBootstrapping for helibBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusDiscretization error reduction for high precision torus fully homomorphic encryptionOptimisations and tradeoffs for HElibEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionBatched fully homomorphic encryption from TFHEHomomorphic encryption: a mathematical surveyLarge-precision homomorphic sign evaluation using FHEW/TFHE bootstrappingEvalRound algorithm in CKKS bootstrappingImproved programmable bootstrapping with larger precision and efficient arithmetic circuits for TFHELinear-time 2-party secure merge from additively homomorphic encryption\textsf{ComBo}: a novel functional bootstrapping method for efficient evaluation of nonlinear functions in the encrypted domainFast blind rotation for bootstrapping FHEsHERMES: efficient ring packing using MLWE ciphertexts and application to transcipheringEfficient homomorphic comparison methods with optimal complexityPractical Fully Homomorphic Encryption for Fully Masked Neural NetworksTFHE: fast fully homomorphic encryption over the torusBoosting verifiable computation on encrypted dataFlexible and efficient verifiable computation on encrypted data


Uses Software