SCIENCE CHINA Information Sciences, Volume 61 , Issue 2 : 029101(2018) https://doi.org/10.1007/s11432-017-9206-y

Multi-key FHE for multi-bit messages

More info
  • ReceivedMar 2, 2017
  • AcceptedJul 19, 2017
  • PublishedJan 3, 2018


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant No. 61472097).


Appendices A–E.


[1] Gentry C. Fully homomorphic encryption using ideal lattices. Acm Symp Theory Comput, 2009, 9: 169--178. Google Scholar

[2] Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. In: Proceedings of 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS), Palm Springs, 2011. 97--106. Google Scholar

[3] Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology — CRYPTO 2013. Berlin: Springer, 2013. 8042: 75--92. Google Scholar

[4] Hiromasa R, Abe M, Okamoto T. Packing messages and optimizing bootstrapping in GSW-FHE In: Public-Key Cryptography — PKC 2015. Berlin: Springer, 2015. 9020: 699--715. Google Scholar

[5] Li Z, Galbraith S, Ma C. Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme. In: Proceedings of International Conference on Provable Security. Cham: Springer, 2016. 10005: 373--383. Google Scholar

[6] Li Z, Ma C, Morais E, et al. Multi-bit leveled homomorphic encryption via dual.lwe-based. In: Proceedings of International Conference on Information Security and Cryptology. Cham: Springer, 2016. 10143: 221--242. Google Scholar

[7] Lopez-Alt A, Tromer E, Vaikuntanathan V. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th ACM Symposium on Theory of Computing, New York, 2012. 1219--1234. Google Scholar

[8] Clear M, McGoldrick C. Multi-identity and multi-key leveled FHE from learning with errors. In: Advances in Cryptology — CRYPTO 2015. Berlin: Springer, 2015. 9216: 630--656. Google Scholar

[9] Mukherjee P, Wichs D. Two round multiparty computation via multi-key FHE In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2016. 9666: 735--763. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备17057255号       京公网安备11010102003388号