Fully Homomorphic Encryption: Advanced Techniques and Optimizations - Session 2

Fully Homomorphic Encryption: Advanced Techniques and Optimizations - Session 2

TheIACR via YouTube Direct link

Instantiations of Tensor Fields/Rings

14 of 26

14 of 26

Instantiations of Tensor Fields/Rings

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Fully Homomorphic Encryption: Advanced Techniques and Optimizations - Session 2

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Fully Homomorphic Encryption
  3. 3 Noise Grows with Computation
  4. 4 Need to Clean Noise
  5. 5 Bootstrapping Framework [Gentry]
  6. 6 Current State of the Art
  7. 7 Limitations and Tradeoffs
  8. 8 Fundamental Question
  9. 9 Recap of (R)LWE and RGSW
  10. 10 Recap of FHEW-like Bootstrapping
  11. 11 Technical Barriers for SIMD
  12. 12 New Mathematical Framework
  13. 13 Final Solution - Reuse Rings
  14. 14 Instantiations of Tensor Fields/Rings
  15. 15 Summary
  16. 16 Homomorphic Comp of the Framework
  17. 17 Overall Computation Structure
  18. 18 Application to FHEW-like Algorithms
  19. 19 Error Growth for Batch FHEW
  20. 20 Parameters of the Rings
  21. 21 Results and Comparison
  22. 22 High Level Question
  23. 23 (Recursive) Nussbaumer Transform [MS18]
  24. 24 DFT-based Polynomial Multiplications [MS18]
  25. 25 Optimization by Recursion
  26. 26 FHEW with Nussbaumer Transform

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.