There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.conferencePlace | GR | - |
dc.citation.endPage | 335 | - |
dc.citation.startPage | 315 | - |
dc.citation.title | EUROCRYPT : Theory and Applications of Cryptographic Techniques 32nd Annual International Conference | - |
dc.contributor.author | Cheon, Jung Hee | - |
dc.contributor.author | Coron, Jean-Sebastien | - |
dc.contributor.author | Kim, Jinsu | - |
dc.contributor.author | Lee, Moon Sung | - |
dc.contributor.author | Lepoint, Tancrede | - |
dc.contributor.author | Tibouchi, Mehdi | - |
dc.contributor.author | Yun, Aaram | - |
dc.date.accessioned | 2023-12-20T01:06:28Z | - |
dc.date.available | 2023-12-20T01:06:28Z | - |
dc.date.created | 2014-12-23 | - |
dc.date.issued | 2013-05-28 | - |
dc.description.abstract | We extend the fully homomorphic encryption scheme over the integers of van Dijk et al.(DGHV) into a batch fully homomorphic encryption scheme, i.e. to a scheme that supports encrypting and homomorphically processing a vector of plaintexts as a single ciphertext. We present two variants in which the semantic security is based on different assumptions. The first variant is based on a new decisional problem, the Decisional Approximate-GCD problem, whereas the second variant is based on the more classical computational Error-Free Approximate-GCD problem but requires additional public key elements. We also show how to perform arbitrary permutations on the underlying plaintext vector given the ciphertext and the public key. Our scheme offers competitive performance even with the bootstrapping procedure: we describe an implementation of the homomorphic evaluation of AES, with an amortized cost of about 12 minutes per AES ciphertext on a standard desktop computer; this is comparable to the timings presented by Gentry et al.at Crypto 2012 for their implementation of a Ring-LWE based fully homomorphic encryption scheme. |
- |
dc.identifier.bibliographicCitation | EUROCRYPT : Theory and Applications of Cryptographic Techniques 32nd Annual International Conference, pp.315 - 335 | - |
dc.identifier.doi | 10.1007/978-3-642-38348-9_20 | - |
dc.identifier.scopusid | 2-s2.0-84883356524 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/35650 | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007%2F978-3-642-38348-9_20 | - |
dc.language | 영어 | - |
dc.publisher | International Association for Cryptologic Research (IACR) | - |
dc.title | Batch Fully Homomorphic Encryption over the Integers | - |
dc.type | Conference Paper | - |
dc.date.conferenceDate | 2013-05-26 | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.