Javascript must be enabled to continue!
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
View through CrossRef
<p>We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos \cite{32} in 1978, and to some new problems appeared in Peikert \cite{28} as open questions 10 and open questions 11 a few years ago.</p>
<p>Our scheme is completely different from the breakthrough work \cite{14,15} of Gentry in 2009. Gentry's bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of unbounded FHE scheme is straightforward and noise-free that can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique.</p>
Title: An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
Description:
<p>We propose an unbounded fully homomorphic encryption scheme, i.
e.
a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys.
This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos \cite{32} in 1978, and to some new problems appeared in Peikert \cite{28} as open questions 10 and open questions 11 a few years ago.
</p>
<p>Our scheme is completely different from the breakthrough work \cite{14,15} of Gentry in 2009.
Gentry's bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function.
To date, it remains the only known way of obtaining unbounded FHE.
Our construction of unbounded FHE scheme is straightforward and noise-free that can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique.
</p>.
Related Results
Unbounded Star Convergence in Lattices
Unbounded Star Convergence in Lattices
Let L be a vector lattice, "(" x_α ") " be a L-valued net, and x∈L . If |x_α-x|∧u→┴o 0 for every u ∈〖 L〗_+ then it is said that the net "(" x_α ")" unbounded order converges ...
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
<p>We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decryp...
Development Paillier's library of fully homomorphic encryption
Development Paillier's library of fully homomorphic encryption
One of the new areas of cryptography considered-homomorphic cryptography. The article presents the main areas of application of homomorphic encryption. An analysis of existing deve...
Power of Homomorphic Encryption in Secure Data Processing
Power of Homomorphic Encryption in Secure Data Processing
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. This paper presents a detailed discuss...
Homomorphic Encryption and its Application to Blockchain
Homomorphic Encryption and its Application to Blockchain
The concept, method, algorithm and application of the advanced field of cryptography, homomorphic encryption, as well as its application to the field of blockchain are discussed in...
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To addres...
Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace
Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace
With the advent of the intelligent era, more and more artificial intelligence algorithms are widely used and a large number of user data are collected in the cloud server for shari...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...

