We present constructions of CPA-secure (leveled) homomorphic encryption from learning with errors (LWE) problem. We use the construction introduced by Gentry, Sahai and Waters ‘GSW’ (CRYPTO’13) as building blocks of our schemes. We apply their approximate eigenvector method to our scheme. In contrast to the GSW scheme we provide extensions of the (leveled) homomorphic identity-based encryption (IBE) and (leveled) homomorphic attribute-based encryption (ABE) on the multi-identity and multi-attribute settings respectively. We realize the (leveled) homomorphic property for the multi-party setting by applying tensor product and natural logarithm. Tensor product and natural logarithm allow to evaluate different ciphertexts computed under differe...
Recently, cloud technologies has become a cost-effective data solution among the small and medium-si...
We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves perform...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...
Abstract. It has been an open problem for a number of years to construct an identity-based fully hom...
Group Homomorphic Encryption (GHE), formally defined by Armknecht, Katzenbeisser and Peter, is a pub...
Recently, homomorphic encryption is becoming one of the holy grail in modern cryptography research a...
Non-interactive computing delegation, multikey FHE, CP-ABE, homomorphic encryption, access policy co...
In this paper we consider fully homomorphic encryption based on the learning with errors problem. We...
With the development of new computing models such as cloud computing, user’s data are at the risk of...
The efficiency of fully homomorphic encryption is a big question at present. To improve efficiency o...
There has been a great deal of work on improving the efficiency of fully homomorphic encryption (FHE...
Group Homomorphic Encryption (GHE), formally defined by Armknecht, Katzenbeisser and Peter, is a pub...
Basing on Learning with errors over rings (RLWE) assumption, we provide a new multi-bit somewhat hom...
Identity-based proxy re-encryption (IBPRE) is a powerful cryptographic tool for various applications...
International audienceWe extend the fully homomorphic encryption scheme over the integers of van Dij...
Recently, cloud technologies has become a cost-effective data solution among the small and medium-si...
We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves perform...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...
Abstract. It has been an open problem for a number of years to construct an identity-based fully hom...
Group Homomorphic Encryption (GHE), formally defined by Armknecht, Katzenbeisser and Peter, is a pub...
Recently, homomorphic encryption is becoming one of the holy grail in modern cryptography research a...
Non-interactive computing delegation, multikey FHE, CP-ABE, homomorphic encryption, access policy co...
In this paper we consider fully homomorphic encryption based on the learning with errors problem. We...
With the development of new computing models such as cloud computing, user’s data are at the risk of...
The efficiency of fully homomorphic encryption is a big question at present. To improve efficiency o...
There has been a great deal of work on improving the efficiency of fully homomorphic encryption (FHE...
Group Homomorphic Encryption (GHE), formally defined by Armknecht, Katzenbeisser and Peter, is a pub...
Basing on Learning with errors over rings (RLWE) assumption, we provide a new multi-bit somewhat hom...
Identity-based proxy re-encryption (IBPRE) is a powerful cryptographic tool for various applications...
International audienceWe extend the fully homomorphic encryption scheme over the integers of van Dij...
Recently, cloud technologies has become a cost-effective data solution among the small and medium-si...
We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves perform...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...