Security and Encoding in Fully Homomorphic Encryption - Rachel Player, Sorbonne Université

Security and Encoding in Fully Homomorphic Encryption - Rachel Player, Sorbonne Université

Alan Turing Institute via YouTube Direct link

The Bounded Distance Decoding (BDD) problem

8 of 21

8 of 21

The Bounded Distance Decoding (BDD) problem

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security and Encoding in Fully Homomorphic Encryption - Rachel Player, Sorbonne Université

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is homomorphic encryption?
  3. 3 Achieving homomorphic encryption
  4. 4 Applications of homomorphic encryption
  5. 5 Is homomorphic encryption practical?
  6. 6 The Learning with Errors problem (LWE)
  7. 7 LWE parameters
  8. 8 The Bounded Distance Decoding (BDD) problem
  9. 9 The Ring-LWE problem
  10. 10 Security argument for the FV scheme?
  11. 11 Algorithms for solving LWE
  12. 12 NIST post-quantum standardisation process
  13. 13 Estimating NTRU-based schemes in the LWE estimator
  14. 14 Estimating cost of Lattice reduction
  15. 15 Implementing the SVP oracle
  16. 16 Translating asymptotics into concrete cost
  17. 17 Cost models used in NIST proposal
  18. 18 Need to ensure correctness of decoding
  19. 19 Examples: binary and balanced base-B encoding
  20. 20 Other choices for comparison
  21. 21 Maximal depth and noise

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.