2020
DOI: 10.1007/978-3-030-65277-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…But it is worth to notice that several other applications that use the GSW scheme could take advantage of the faster homomorphic operations of NGS. For example, by simply replacing GSW by NGS, one could speed up the transciphering for TFHE [20], or the homomorphic evaluation of maximum and minimum functions from [11], or the tree-based private information retrieval from [29].…”
Section: Our Techniques and Resultsmentioning
confidence: 99%
“…But it is worth to notice that several other applications that use the GSW scheme could take advantage of the faster homomorphic operations of NGS. For example, by simply replacing GSW by NGS, one could speed up the transciphering for TFHE [20], or the homomorphic evaluation of maximum and minimum functions from [11], or the tree-based private information retrieval from [29].…”
Section: Our Techniques and Resultsmentioning
confidence: 99%
“…The paradigm of FiLIP is recalled in Figure 2. We implemented the variant that is called FiLIP-144 in [HMR20], which consists in setting Z = 2 14 , z = 144 and f as the XOR-THR function XTHR [81,32,63] (that we recall in Definition 2). We note that those parameters of FiLIP-144 yield 128 bit security, following the analysis in [MCJS19].…”
Section: Filip Ciphermentioning
confidence: 99%
“…These results have more implications for cryptographic applications: for example in the (improved) filter permutator context [2,32], for hybrid homomorphic encryption, there are efficient ways to evaluate symmetric functions (as illustrated in [33]), and doing one addition is cheap, therefore it is interesting to consider the best function in the S 0 -class of a filter function. In that case, for all contexts where adding one function is cheap, the hunt for optimized functions could be split into finding a cheap function to evaluate, and then determining the one with best cryptographic parameters in its T -class.…”
Section: Beyond Parameters In S 0 -Classesmentioning
confidence: 99%