Proceedings of the 2018 8th International Conference on Manufacturing Science and Engineering (ICMSE 2018) 2018
DOI: 10.2991/icmse-18.2018.129
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Homomorphic Technique in Construction of Fully Homomorphic Encryption Scheme from LWE

Abstract: In this paper, we study the homomorphic techniques used in GSW fully homomorphic encryption scheme, and point out the drawback which prevents the GSW scheme from efficiency. In order to conquer the weakness of low efficiency, we propose an improved homomorphic technique. Through comparative analysis, our proposed technique is proved to not only improve the efficiency substantially, but also keep the functionality essentially required.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In this section, the proposed HIZWFHE Scheme is investigated with the existing GENTRY-FHE [20], SMART-VEC [19] and BATCH-DGHV [18] fully homomorphic encryption schemes considered for facilitating superior security in big data computations in the clouds. The performance of the proposed HIZWFHE Scheme is compared with the benchmarked schemes by the enforcement of n x n linear transformation process that gets converted into a n-dimensional vector.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, the proposed HIZWFHE Scheme is investigated with the existing GENTRY-FHE [20], SMART-VEC [19] and BATCH-DGHV [18] fully homomorphic encryption schemes considered for facilitating superior security in big data computations in the clouds. The performance of the proposed HIZWFHE Scheme is compared with the benchmarked schemes by the enforcement of n x n linear transformation process that gets converted into a n-dimensional vector.…”
Section: Resultsmentioning
confidence: 99%
“…The unmask performance time, memory consumptions of this RN-FHE was also estimated to be 23% lower than the DORACS-FHE scheme. In addition, a FHE that focuses on the provision of security against Adaptive Chosen Ciphertext Attack (CCA) was proposed for handling the issues that are the most common in cloud storage, cloud computation, electronic voting and multi-party computation [19]. This FHE scheme included the property of residual classes by imposing the composite degree of modular arithmetic with determined superior security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation