2020
DOI: 10.15514/ispras-2020-32(2)-4
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Homomorphic Encryption Algorithms Based on Learning with Errors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This advantage of reducing the number of function calls is also reflected in the subsequent homomorphic evaluation. A comparison between the BFV and CKKS shows that CKKS is advantageous in terms of the evaluation time required for realizing stochastic addition and multiplication, although the packing/unpacking (i.e., encoding/decoding) of CKKS takes a little longer due to its unique features such as the usage of floating-point representation [38].…”
Section: Basic Implementation and Comparisonmentioning
confidence: 99%
“…This advantage of reducing the number of function calls is also reflected in the subsequent homomorphic evaluation. A comparison between the BFV and CKKS shows that CKKS is advantageous in terms of the evaluation time required for realizing stochastic addition and multiplication, although the packing/unpacking (i.e., encoding/decoding) of CKKS takes a little longer due to its unique features such as the usage of floating-point representation [38].…”
Section: Basic Implementation and Comparisonmentioning
confidence: 99%
“…We will evaluate the performance of the two most successful FHE schemes: Brakerski/Fan-Vercauteren (BFV) (Fan & Vercauteren, 2012) and Cheon, Kim, Kim, and Son (CKKS) (Cheon et al, 2017), used in TenSEAL (Benaissa et al, 2021 and PyFHEl (Ibarrondo & Viand, 2021) python base libraries that we have considered in this paper. Their main feature is the use of the residue number system (RNS) for performing operations (Babenko et al, 2020). This is done by determining the execution time of the main functions (encoding, encryption, addition/multiplication operations, decryption, and decoding) in the scheme, thereby determining the most productive scheme.…”
Section: Introductionmentioning
confidence: 99%