Finding and evaluating parameters for BGV

J Mono, C Marcolla, G Land, T Güneysu… - … Conference on Cryptology …, 2023 - Springer
… to our bounds based on the purely theoretical approach with the canonical embedding norm.
… secret key distributions. Finally, we combine our theoretical research and implement our …

Multipars: Reduced-Communication MPC over Z2k

S Hasler, P Reisert, M Rivinius, R Küsters - Cryptology ePrint Archive, 2023 - eprint.iacr.org
… Multipars (multi-party rust) because we implemented it … BGV encryption scheme and a
secure key generation protocol in Section 3. We show the 2s-enhanced CPA security of this BGV

[PDF][PDF] Pure Multi Key BGV Implementation.

J Paillet, O Chakraborty, M Checri - ICISSP, 2024 - scitepress.org
… Multiplication is the critical point in the BGV MultiKey cryptographic scheme, … key, also known
as the relinearisation key in the BGV scheme. To do so, we need to use all the parties’ keys, …

Non-linear operations and verifiable decryption in BGV

J Bernabé Rodríguez - 2023 - openaccess.uoc.edu
… look at the code available in the OpenFHE implementation of BGV and BFV. From this code,
… The idea is not to use a pure multi-party computation protocol, but to create a distributed key

Revisiting homomorphic encryption schemes for finite fields

A Kim, Y Polyakov, V Zucca - … 2021: 27th International Conference on the …, 2021 - Springer
key switching to our BGV instantiation and eliminate any multiprecision arithmetic from our
BGV implementation… estimation, which makes the BGV implementation less robust and usable …

Homomorphic evaluation of the AES circuit

C Gentry, S Halevi, NP Smart - Annual Cryptology Conference, 2012 - Springer
… Our implementation is based on a variant of the BGV scheme … of BGV-type cryptosystems is
that the current secret key and … number of levels (by purely counting multiplication gates), but …

Homomorphic AES evaluation using the modified LTV scheme

Y Doröz, Y Hu, B Sunar - Designs, Codes and Cryptography, 2016 - Springer
… the scheme appears to be more efficient, a full implementation and comparison to BGV style
… for key switching is eliminated. Finally, we present a generic bit-sliced implementation of the …

Homomorphic AES evaluation using NTRU

Y Doroz, Y Hu, B Sunar - Cryptology ePrint Archive, 2014 - eprint.iacr.org
… To understand the impact of this restriction on key generation and on the size of the key space
… When compared to the BGV style leveled AES implementation by Gentry, Smart, Halevi (…

Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference

H Chen, W Dai, M Kim, Y Song - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
… We provide a proof-of-concept implementation of both MKHE … a multi-key variant of the BGV
scheme [7]. Note that all the above studies were purely abstract with no implementation given…

F1: A fast and programmable accelerator for fully homomorphic encryption

N Samardzic, A Feldmann, A Krastev… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
… we describe how BGV represents encrypted data and how each operation is implemented.
… But prior accelerators do not implement automorphisms, so we extend each HEAX key-…