2021
DOI: 10.1109/access.2021.3117029
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Encryption for Multiple Users With Less Communications

Abstract: Keeping privacy for every entity in outsourced computation is always a crucial issue. For efficient secure computation, homomorphic encryption (HE) can be one of nice solutions. Especially, multikey homomorphic encryption (MKHE) which allows homomorphic evaluation on encrypted data under different keys can be one of the simplest solutions for a secure computation which handles multiple users' data. However, the current main problem of MKHE is that the dimension of its evaluated ciphertext relies on the number … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…Notice that obtaining this secret key structure from existing lattice-based HE schemes is already well known and simple in a common random string (CRS) model [4], [5], [19]. For example, following the same notation as in subsection III-A, the ciphertext LWE s1 (0) + • • • + LWE sk (0) can be decrypted using the secret key s provided that the same mask a was used for all parties as the masks of these k LWE ciphertexts 3 .…”
Section: Multiparty Fhementioning
confidence: 99%
See 4 more Smart Citations
“…Notice that obtaining this secret key structure from existing lattice-based HE schemes is already well known and simple in a common random string (CRS) model [4], [5], [19]. For example, following the same notation as in subsection III-A, the ciphertext LWE s1 (0) + • • • + LWE sk (0) can be decrypted using the secret key s provided that the same mask a was used for all parties as the masks of these k LWE ciphertexts 3 .…”
Section: Multiparty Fhementioning
confidence: 99%
“…For example, following the same notation as in subsection III-A, the ciphertext LWE s1 (0) + • • • + LWE sk (0) can be decrypted using the secret key s provided that the same mask a was used for all parties as the masks of these k LWE ciphertexts 3 . We follow the most communication efficient MPHE protocol [5], which can be described as follows:…”
Section: Multiparty Fhementioning
confidence: 99%
See 3 more Smart Citations