logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 2: 029101(2018) https://doi.org/10.1007/s11432-017-9206-y

Multi-key FHE for multi-bit messages

More info
  • ReceivedMar 2, 2017
  • AcceptedJul 19, 2017
  • PublishedJan 3, 2018

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant No. 61472097).


Supplement

Appendices A–E.


References

[1] Gentry C. Fully homomorphic encryption using ideal lattices. Acm Symp Theory Comput, 2009, 9: 169--178. Google Scholar

[2] Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. In: Proceedings of 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS), Palm Springs, 2011. 97--106. Google Scholar

[3] Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology — CRYPTO 2013. Berlin: Springer, 2013. 8042: 75--92. Google Scholar

[4] Hiromasa R, Abe M, Okamoto T. Packing messages and optimizing bootstrapping in GSW-FHE In: Public-Key Cryptography — PKC 2015. Berlin: Springer, 2015. 9020: 699--715. Google Scholar

[5] Li Z, Galbraith S, Ma C. Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme. In: Proceedings of International Conference on Provable Security. Cham: Springer, 2016. 10005: 373--383. Google Scholar

[6] Li Z, Ma C, Morais E, et al. Multi-bit leveled homomorphic encryption via dual.lwe-based. In: Proceedings of International Conference on Information Security and Cryptology. Cham: Springer, 2016. 10143: 221--242. Google Scholar

[7] Lopez-Alt A, Tromer E, Vaikuntanathan V. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th ACM Symposium on Theory of Computing, New York, 2012. 1219--1234. Google Scholar

[8] Clear M, McGoldrick C. Multi-identity and multi-key leveled FHE from learning with errors. In: Advances in Cryptology — CRYPTO 2015. Berlin: Springer, 2015. 9216: 630--656. Google Scholar

[9] Mukherjee P, Wichs D. Two round multiparty computation via multi-key FHE In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2016. 9666: 735--763. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1