Homomorphic encryption for arithmetic of approximate numbers

From MaRDI portal
Publication:2412881

DOI10.1007/978-3-319-70694-8_15zbMath1420.94051OpenAlexW2768174108WikidataQ61068279 ScholiaQ61068279MaRDI QIDQ2412881

Yongsoo Song, Andrey Kim, Jung Hee Cheon, Miran Kim

Publication date: 6 April 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70694-8_15




Related Items

Algorithmic acceleration of B/FV-like somewhat homomorphic encryption for compute-enabled RAMFaster homomorphic encryption over GPGPUs via hierarchical DGTWhen HEAAN meets FV: a new somewhat homomorphic encryption with reduced memory overheadApproximate homomorphic encryption with reduced approximation errorHomomorphic lower digits removal and improved FHE bootstrappingBootstrapping for approximate homomorphic encryptionPrivate computation of polynomials over networksSine series approximation of the mod function for bootstrapping of approximate HELimits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\)High-precision bootstrapping for approximate homomorphic encryption by error variance minimization\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionField instruction multiple dataBootstrapping for helibBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusPrivacy-preserving multikey computing framework for encrypted data in the cloudBLEACH: cleaning errors in discrete computations over CKKSOptimisations and tradeoffs for HElibEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionEfficiently processing complex-valued data in homomorphic encryptionParameter optimization and larger precision for (T)FHESecureBiNN: 3-party secure computation for binarized neural network inferenceAchievable \textsf{CCA2} relaxation for homomorphic encryptionHomomorphic encryption: a mathematical surveyLarge-precision homomorphic sign evaluation using FHEW/TFHE bootstrappingEvalRound algorithm in CKKS bootstrappingMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingSecuring approximate homomorphic encryption using differential privacyBalanced non-adjacent formsRevisiting homomorphic encryption schemes for finite fieldsTransciphering framework for approximate homomorphic encryptionImproved programmable bootstrapping with larger precision and efficient arithmetic circuits for TFHEReduction-free multiplication for finite fields and polynomial ringsMore efficient verifiable functional encryptionBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsEfficient circuits for permuting and mapping packed values across leveled homomorphic ciphertexts\textsf{ComBo}: a novel functional bootstrapping method for efficient evaluation of nonlinear functions in the encrypted domainCoefficient grouping for complex affine layersFast blind rotation for bootstrapping FHEsHERMES: efficient ring packing using MLWE ciphertexts and application to transcipheringAccelerating HE operations from key decomposition techniquePrivate AI: Machine Learning on Encrypted DataToward practical privacy-preserving linear regressionMaliciously secure matrix multiplication with applications to private deep learningEfficient homomorphic comparison methods with optimal complexitySLAP: simpler, improved private stream aggregation from ring learning with errorsAn efficient threshold access-structure for RLWE-based multiparty homomorphic encryptionA full RNS variant of approximate homomorphic encryptionUnnamed ItemCHIMERA: combining ring-LWE-based fully homomorphic encryption schemesTFHE: fast fully homomorphic encryption over the torusEfficient bootstrapping for approximate homomorphic encryption with non-sparse keysHigh-precision bootstrapping of RNS-CKKS homomorphic encryption using optimal minimax polynomial approximation and inverse sine functionOn the security of homomorphic encryption on approximate numbersFlexible and efficient verifiable computation on encrypted dataInteger polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sortingBootstrapping for approximate homomorphic encryption with negligible failure-probability by using sparse-secret encapsulationPSI-stats: private set intersection protocols supporting secure statistical functionsEfficient homomorphic conversion between (ring) LWE ciphertexts