Fully Homomorphic Encryption over the Integers

  title={Fully Homomorphic Encryption over the Integers},
  author={Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan},
  booktitle={International Conference on the Theory and Application of Cryptographic Techniques},
We construct a simple fully homomorphic encryption scheme, using only elementary modular arithmetic. We use Gentry’s technique to construct a fully homomorphic scheme from a “bootstrappable” somewhat homomorphic scheme. However, instead of using ideal lattices over a polynomial ring, our bootstrappable encryption scheme merely uses addition and multiplication over the integers. The main appeal of our scheme is the conceptual simplicity. We reduce the security of our scheme to finding an… 

Practical Homomorphic Encryption Over the Integers

A sequence of generalisations is presented of basic homomorphic encryption schemes for integer arithmetic, intended for use in secure single-party computation in the cloud, with increasing levels of security, but decreasing practicality.

Parameter Constraints on Homomorphic Encryption Over the Integers

The research paper Fully Homomorphic Encryption over the Integers by van Dijk, Gentry, Halevi, and Vaikuntanathan [31] explores the construction of an encryption scheme over the integers that is

Fully Homomorphic Encryption over the Integers with Shorter Public Keys

It is shown that fully homomorphic encryption can be implemented using simple arithmetic operations, and some optimizations from the recent Gentry-Halevi implementation of Gentry's scheme are obtained, roughly the same level of efficiency.

Integer-based fully homomorphic encryption

This paper explores one such bootstrappable system based on simple integer arithmetic in a manner that someone without a high level of experience in homomorphic encryption can readily understand and presents an implementation of the system as well as a latticebased attack.

Fully homomorphic encryption modulo Fermat numbers

  • A. Joux
  • Computer Science, Mathematics
    IACR Cryptol. ePrint Arch.
  • 2019
This paper recast state-of-the-art constructions for fully homomorphic encryption in the simple language of arithmetic modulo large Fermat numbers in a simple ring to make its implementation much easier.

Fully Homomorphic Encryption from Approximate Ideal Lattices

The security of the somewhat homomorphic encryption scheme is reduced to solving a partial approximate ideal lattice problem and the performance of the proposed scheme is demonstrated to be better than that of previous schemes by computational experimental.

Faster Fully Homomorphic Encryption

Two improvements to Gentry’s fully homomorphic scheme based on ideal lattices are described: a more aggressive analysis of one of the hardness assumptions and a probabilistic decryption algorithm that can be implemented with an algebraic circuit of low multiplicative degree.

Symmetric Somewhat Homomorphic Encryption over the Integers

A symmetric variant of homomomorphic encryption scheme by van Dijk et al.

New Fully Homomorphic Encryption over the Integers

  • Chunsheng Gu
  • Mathematics, Computer Science
    IACR Cryptol. ePrint Arch.
  • 2011
A new fully homomorphic encryption scheme is constructed, whose security depends on the hardness of the decisional approximate principle ideal lattice polynomial (APIP), given a list of approximate multiples of a principal ideal lattICE.

A New Somewhat Homomorphic Encryption Scheme over Integers

This paper reduces the public key size to Õ(λ<sup>3</sup>) by encrypting with a new form using Gentry's techniques, and can easily convert the somewhat scheme into a practical fully homomorphic encryption scheme available in cloud computing.



Fully homomorphic encryption using ideal lattices

This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.

A fully homomorphic encryption scheme

This work designs a somewhat homomorphic "boostrappable" encryption scheme that works when the function f is the scheme's own decryption function, and shows how, through recursive self-embedding, bootstrappable encryption gives fully homomorphic encryption.


It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.

New lattice-based cryptographic constructions

  • O. Regev
  • Mathematics, Computer Science
  • 2004
A new public key cryptosystem whose security guarantee is considerably stronger than previous results is provided, and a family of collision resistant hash functions with an improved security guarantee in terms of the unique shortest vector problem is proposed.

Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities

It is shown how to find sufficiently small integer solutions to a polynomial in a single variable modulo N, and to a Poole's inequality in two variables over the integers.

Evaluating Branching Programs on Encrypted Data

The main construction generalizes the approach of Kushilevitz and Ostrovsky for constructing single-server Private Information Retrieval protocols and shows how to strengthen the above so that c′ does not contain additional information about P (other than P(x) for some x) even if the public key and the ciphertext c are maliciously formed.

Approximate Integer Common Divisors

As an application of the partial approximate common divisor algorithm, it is shown that a cryptosystem proposed by Okamoto actually leaks the private information directly from the public information in polynomial time.

Probabilistic Encryption

A Proof of Security of Yao’s Protocol for Two-Party Computation

This paper provides a complete description of Yao’s protocol, along with a rigorous proof of security, for the first time that an explicitProof of security has been published.

The Two Faces of Lattices in Cryptology

  • Phong Q. Nguyen
  • Mathematics, Computer Science
    Selected Areas in Cryptography
  • 2001
This talk will try to survey the main examples of the two faces of lattices in cryptology, and find out whether public-key cryptosystems based on the hardness of lattice problems, and lattices play a crucial role in a few security proofs.