• No results found

Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption

N/A
N/A
Protected

Academic year: 2020

Share "Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption"

Copied!
21
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1. An image of secure matrix multiplication A × B in the cloud
Table 1. Performance of our secure matrix multiplications A1 × · · · × Aℓ over HElib,where every square matrix Ai has size m and p-bit integer entries (we represent Ai asM ×M sub-matrices in our block-matrix method, and split the plaintext modulus into4 pr
Table 2. Performance comparison of our method (Theorem 4) with the diagonal-basedwhere every square matrixmethod (Subsection 3.1) for secure matrix-vector multiplications A1 × · · · Aℓ−1 × v, Ai and column vector v have size m and p-bit integerentries
Fig. 2. Plot showing comparison of the results between our method and the diagonal-based method for secure matrix-vector multiplications A1×· · ·×Aℓ−1×v

References

Related documents

Therefore, the assumptions needed in order to have an in‡ation target as the optimal plan are: (1) = 1; (2) there should be no mark-up shocks ( t = 0 ; 8 t ); and, in the case of

Therefore, the current study aimed to determine preva- lences of HIV, syphilis, and hepatitis B and C infections and to identify associated risk factors for these infections among

Morton as a member to the working group on xenotransplantation of the Scientific Committee on Medicinal Products and Medical Devices briefed the sub-committee on the state of the

The second-brood sperm appeared to be 100 percent labeled both in respect to number of bundles and the number of sperm heads within each bundle, indicating

Zusammenfassend lässt sich somit sagen, dass [i] S100A9 und S100A8 im Verlauf einer Pneumokokkenmeningitis (vorwiegend) passiv aus untergehenden Granulozyten freigesetzt

This highly accurate scheme for planar interface problems — the Local Plane Wave Expansion (LPWE) formulation will be developed in detail in Section 3.. To evaluate the performance

Form CA-2 (''Federal Employees' Notice of Occupational Disease and Claim for Compensation"), your statements in response to the checklist, and a report from your treating

Once the receiving node receives a control or data packet from the neighbouring nodes with lower depth, it will reset the void detection timer.. If no neighbouring node