(Leveled) fully homomorphic encryption without bootstrapping

From MaRDI portal
Publication:2826066

DOI10.1145/2090236.2090262zbMath1347.68120OpenAlexW2152926062MaRDI QIDQ2826066

Zvika Brakerski, Vinod Vaikuntanathan, Craig Gentry

Publication date: 7 October 2016

Published in: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2090236.2090262




Related Items (only showing first 100 items - show all)

Constraining and Watermarking PRFs from Milder AssumptionsHomomorphic Encryption StandardAn Improved Leveled Fully Homomorphic Encryption Scheme over the IntegersFully Homomorphic Encryption with Auxiliary InputsEfficient Secure Multiparty Computation with Identifiable AbortTargeted Homomorphic Attribute-Based EncryptionSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionDepth Optimized Efficient Homomorphic SortingPrivate Computation on Encrypted Genomic DataEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesAugmented Learning with Errors: The Untapped Potential of the Error TermA New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOVPrivacy-preserving blueprintsOn polynomial functions Modulo \(p^e\) and faster bootstrapping for homomorphic encryptionRinocchio: SNARKs for ring arithmeticA Homomorphic Proxy Re-encryption from LatticesOptimisations and tradeoffs for HElibPost-quantum anonymity of KyberOblivious message retrievalSolving LWR via BDD Strategy: Modulus Switching ApproachEfficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesVerifiable decryption in the headMulti-key Homomorphic Proxy Re-EncryptionFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsMultikey Fully Homomorphic Encryption and ApplicationsAttacks on the Search RLWE Problem with Small ErrorsLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentOn error distributions in ring-based LWEMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedFully Homomorphic Encryption for Point NumbersDeterministic compression with uncertain priorsEnhancing Data Parallelism of Fully Homomorphic EncryptionLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsBoolean Functions for Homomorphic-Friendly Stream CiphersImproved Multiplication Triple Generation over Rings via RLWE-Based AHERing Packing and Amortized FHEW BootstrappingPacked Ciphertexts in LWE-Based Homomorphic EncryptionImproved (Hierarchical) Inner-Product Encryption from LatticesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESFHE over the Integers: Decomposed and Batched in the Post-Quantum RegimePrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsUnnamed ItemLimits of local algorithms over sparse random graphsWatermarking cryptographic functionalities from standard lattice assumptionsEncoding of Rational Numbers and Their Homomorphic Computations for FHE-Based ApplicationsInteger Version of Ring-LWE and Its ApplicationsPrivate Conjunctive Query over Encrypted DataLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsHow to Use Indistinguishability Obfuscation: Deniable Encryption, and MoreOutsourcing Medical Dataset Analysis: A Possible SolutionFaster Homomorphic Evaluation of Discrete Fourier TransformsHomomorphic EncryptionLattice-Based SNARGs and Their Application to More Efficient ObfuscationLattice-based key exchange on small integer solution problem



Cites Work


This page was built for publication: (Leveled) fully homomorphic encryption without bootstrapping