Proceedings of the 7th ACM Workshop on Encrypted Computing &Amp; Applied Homomorphic Cryptography 2019
DOI: 10.1145/3338469.3358940
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(32 citation statements)
references
References 13 publications
0
32
0
Order By: Relevance
“…This can be particularly important when using homomorphic encryption in low-latency applications, where communication complexity quickly becomes a bottleneck. 2 25 2 14 130 520 2 3 2 26 2 14 135 540 2 4 2 27 2 14 140 560 2 5 2 28 2 14 145 580 2 6 2 29 2 14 150 600 2 7 2 30 2 14 155 620 2 8 2 31 2 14 160 640 2 9 2 32 2 14 165 660 2 10 2 33 2 14 170 680…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This can be particularly important when using homomorphic encryption in low-latency applications, where communication complexity quickly becomes a bottleneck. 2 25 2 14 130 520 2 3 2 26 2 14 135 540 2 4 2 27 2 14 140 560 2 5 2 28 2 14 145 580 2 6 2 29 2 14 150 600 2 7 2 30 2 14 155 620 2 8 2 31 2 14 160 640 2 9 2 32 2 14 165 660 2 10 2 33 2 14 170 680…”
Section: Discussionmentioning
confidence: 99%
“…For all the implemented schemes we found minimal encryption parameters that support both correct computation of the above functions and a security level of at least 128 bits. To achieve this security level we set the parameters of the original HEAAN scheme according to the recent recommendations for sparsesecret RLWE [8]. Namely, we set the sparsity parameter h = 128.…”
Section: Practical Comparison With Heaanmentioning
confidence: 99%
“…Despite such limitations, generalized key-switching is used to acquire more multiplicative levels. The security level of HE is roughly decided by N and (α+L+1), which increases as N gets larger or (α + L + 1) gets smaller [25]. Recent HE studies [13], [54], [56] and libraries [29], [65] typically target a security level of 128 bits.…”
Section: Primitive He Ops In Ckksmentioning
confidence: 99%
“…A prior study, F1 [66], provided a substandard [4] level of security under 80 bits for CKKS bootstrapping and used smaller cts which simplifies the microarchitecture. λ is a strictly increasing function of N /log P Q [29].…”
Section: E Modern Algorithmic Optimizations In Ckks and T Multa/slotmentioning
confidence: 99%
“…2 reports the results. The x-axis shows λ based on N /log P Q [29], calculated using an estimation tool [68]. The y-axis shows T mult,a/slot for different N 's, L's, and dnums.…”
Section: Desirable Target Parameter Sets For He Acceleratorsmentioning
confidence: 99%