Skip to main content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: The Journal of Supercomputing 13/2023

14.04.2023

A survey on implementations of homomorphic encryption schemes

verfasst von: Thi Van Thao Doan, Mohamed-Lamine Messai, Gérald Gavin, Jérôme Darmont

Erschienen in: The Journal of Supercomputing | Ausgabe 13/2023

Einloggen

Abstract

With the increased need for data confidentiality in various applications of our daily life, homomorphic encryption (HE) has emerged as a promising cryptographic topic. HE enables to perform computations directly on encrypted data (ciphertexts) without decryption in advance. Since the results of calculations remain encrypted and can only be decrypted by the data owner, confidentiality is guaranteed and any third party can operate on ciphertexts without access to decrypted data (plaintexts). Applying a homomorphic cryptosystem in a real-world application depends on its resource efficiency. Several works compared different HE schemes and gave the stakes of this research field. However, the existing works either do not deal with recently proposed HE schemes (such as CKKS) or focus only on one type of HE. In this paper, we conduct an extensive comparison and evaluation of homomorphic cryptosystems’ performance based on their experimental results. The study covers all three families of HE, including several notable schemes such as BFV, BGV, FHEW, TFHE, CKKS, RSA, El-Gamal, and Paillier, as well as their implementation specification in widely used HE libraries, namely Microsoft SEAL, PALISADE, and HElib. In addition, we also discuss the resilience of HE schemes to different kind of attacks such as indistinguishability under chosen plaintext attack and integer factorization attacks on classical and quantum computers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbas A et al (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (Csur) 51(4):1–35 Abbas A et al (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (Csur) 51(4):1–35
2.
Zurück zum Zitat Diffie W, Hellman ME (2019) New directions in cryptography. In: Secure communications and asymmetric cryptosystems. Routledge, pp 143–180 Diffie W, Hellman ME (2019) New directions in cryptography. In: Secure communications and asymmetric cryptosystems. Routledge, pp 143–180
3.
Zurück zum Zitat Taher EG (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472 MathSciNetCrossRefMATH Taher EG (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472 MathSciNetCrossRefMATH
4.
Zurück zum Zitat Pascal P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 223–238 Pascal P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 223–238
5.
Zurück zum Zitat Craig G (2009) A fully homomorphic encryption scheme. Stanford university Craig G (2009) A fully homomorphic encryption scheme. Stanford university
6.
Zurück zum Zitat Zvika B, Craig G, Vinod V (2014) (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):1–36 MathSciNetCrossRefMATH Zvika B, Craig G, Vinod V (2014) (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):1–36 MathSciNetCrossRefMATH
7.
Zurück zum Zitat Junfeng F, Frederik V (2012) Somewhat practical fully homomorphic encryption. In: Cryptology ePrint Archive Junfeng F, Frederik V (2012) Somewhat practical fully homomorphic encryption. In: Cryptology ePrint Archive
8.
Zurück zum Zitat Cheon JH et al (2017) Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 409–437 Cheon JH et al (2017) Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 409–437
9.
Zurück zum Zitat Léo D, Daniele M (2015) FHEW: bootstrapping homomorphic encryption in less than a second. In: Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I 34. Springer, pp 617–640 Léo D, Daniele M (2015) FHEW: bootstrapping homomorphic encryption in less than a second. In: Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I 34. Springer, pp 617–640
11.
Zurück zum Zitat Craig G, Amit S, Brent W (2013) Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology-CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18–22. Proceedings, Part I. Springer, pp 75–92 Craig G, Amit S, Brent W (2013) Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology-CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18–22. Proceedings, Part I. Springer, pp 75–92
12.
Zurück zum Zitat Daniele M, Yuriy P (2021) Bootstrapping in FHEW-like cryptosystems. In: Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp 17–28 Daniele M, Yuriy P (2021) Bootstrapping in FHEW-like cryptosystems. In: Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp 17–28
13.
Zurück zum Zitat Nicolas G et al (2016) Structural lattice reduction: generalized worstcase to average-case reductions and homomorphic cryptosystems. In: Advances in Cryptology-EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8–12, 2016, Proceedings, Part II 35. Springer, pp 528–558 Nicolas G et al (2016) Structural lattice reduction: generalized worstcase to average-case reductions and homomorphic cryptosystems. In: Advances in Cryptology-EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8–12, 2016, Proceedings, Part II 35. Springer, pp 528–558
14.
Zurück zum Zitat Jacob A-S, Chris P (2014) Faster bootstrapping with polynomial error. In: Advances in Cryptology-CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2014, Proceedings, Part I 34. Springer, pp 297–314 Jacob A-S, Chris P (2014) Faster bootstrapping with polynomial error. In: Advances in Cryptology-CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2014, Proceedings, Part I 34. Springer, pp 297–314
15.
Zurück zum Zitat Rivest RL, Adi S, Leonard A (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126 MathSciNetCrossRefMATH Rivest RL, Adi S, Leonard A (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126 MathSciNetCrossRefMATH
16.
Zurück zum Zitat Parmar PV et al (2014) Survey of various homomorphic encryption algorithms and schemes. Int J Comput Appl 91 Parmar PV et al (2014) Survey of various homomorphic encryption algorithms and schemes. Int J Comput Appl 91
17.
Zurück zum Zitat Dan B, Eu-Jin G, Kobbi N (2005) Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography Conference. Springer, pp 325–341 Dan B, Eu-Jin G, Kobbi N (2005) Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography Conference. Springer, pp 325–341
18.
Zurück zum Zitat Subir H, Mauro C (2021) Crypsh: a novel iot data protection scheme based on BGN cryptosystem. IEEE Trans Cloud Comput Subir H, Mauro C (2021) Crypsh: a novel iot data protection scheme based on BGN cryptosystem. IEEE Trans Cloud Comput
19.
Zurück zum Zitat De Castro LRN (2020) Practical homomorphic encryption implementations & applications. PhD thesis. Massachusetts Institute of Technology De Castro LRN (2020) Practical homomorphic encryption implementations & applications. PhD thesis. Massachusetts Institute of Technology
20.
Zurück zum Zitat Oliver M et al (2019) Towards a homomorphic machine learning big data pipeline for the financial services sector. In: Cryptology ePrint Archive Oliver M et al (2019) Towards a homomorphic machine learning big data pipeline for the financial services sector. In: Cryptology ePrint Archive
21.
Zurück zum Zitat Chillotti I et al (2016) A homomorphic LWE based E-voting scheme. In: Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016, Proceedings 7. Springer, pp 245–265 Chillotti I et al (2016) A homomorphic LWE based E-voting scheme. In: Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016, Proceedings 7. Springer, pp 245–265
22.
Zurück zum Zitat Paulo M, Leonel S, Artur M (2017) A survey on fully homomorphic encryption: an engineering perspective. ACM Comput Surv (CSUR) 50(6):1–33 Paulo M, Leonel S, Artur M (2017) A survey on fully homomorphic encryption: an engineering perspective. ACM Comput Surv (CSUR) 50(6):1–33
23.
Zurück zum Zitat Andrey K, Yuriy P, Vincent Z (2021) Revisiting homomorphic encryption schemes for finite fields. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 608–639 Andrey K, Yuriy P, Vincent Z (2021) Revisiting homomorphic encryption schemes for finite fields. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 608–639
24.
Zurück zum Zitat Tancrede L, Michael N (2014) A comparison of the homomorphic encryption schemes FV and YASHE. In: International Conference on Cryptology in Africa. Springer, pp 318–335 Tancrede L, Michael N (2014) A comparison of the homomorphic encryption schemes FV and YASHE. In: International Conference on Cryptology in Africa. Springer, pp 318–335
25.
26.
Zurück zum Zitat Vasily S, Ethan Yi Fan W, Wee KN (2022) Comprehensive performance analysis of homomorphic cryptosystems for practical data processing. In: arXiv preprint arXiv:​2202.​02960 Vasily S, Ethan Yi Fan W, Wee KN (2022) Comprehensive performance analysis of homomorphic cryptosystems for practical data processing. In: arXiv preprint arXiv:​2202.​02960
27.
Zurück zum Zitat Vincent M, Guillaume B, Caroline F (2016) Determination and exploration of practical parameters for the latest Somewhat Homomorphic Encryption (SHE) Schemes Vincent M, Guillaume B, Caroline F (2016) Determination and exploration of practical parameters for the latest Somewhat Homomorphic Encryption (SHE) Schemes
29.
Zurück zum Zitat Yuriy P, et al (2022) Palisade lattice cryptography library user manual. In: Cybersecurity Research Center, New Jersey Institute of Technology (NJIT), Tech Rep Yuriy P, et al (2022) Palisade lattice cryptography library user manual. In: Cybersecurity Research Center, New Jersey Institute of Technology (NJIT), Tech Rep
30.
Zurück zum Zitat Shai H, Victor S (2014) Algorithms in helib. In: Annual Cryptology Conference. Springer, pp 554–571 Shai H, Victor S (2014) Algorithms in helib. In: Annual Cryptology Conference. Springer, pp 554–571
32.
Zurück zum Zitat Caroline F, Fabien G (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:1–10 CrossRef Caroline F, Fabien G (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:1–10 CrossRef
33.
Zurück zum Zitat Zaraket C et al (2021) Cloud based private data analytic using secure computation over encrypted data. J King Saud Univ Comput Inf Sci Zaraket C et al (2021) Cloud based private data analytic using secure computation over encrypted data. J King Saud Univ Comput Inf Sci
34.
Zurück zum Zitat Mohammed SJ, Taha DB (2022) Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms. In: 2022 International Conference on Computer Science and Software Engineering (CSASE). IEEE, pp 89–94 Mohammed SJ, Taha DB (2022) Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms. In: 2022 International Conference on Computer Science and Software Engineering (CSASE). IEEE, pp 89–94
36.
Zurück zum Zitat Halevi S, Shoup V (2018) Faster homomorphic linear transformations in HElib. In: Annual International Cryptology Conference. Springer, pp 93–120 Halevi S, Shoup V (2018) Faster homomorphic linear transformations in HElib. In: Annual International Cryptology Conference. Springer, pp 93–120
37.
Zurück zum Zitat PALISADE v1.10.6. (2020) https://​gitlab.​com/​palisade/​palisade-release.​ PALISADE Project, Dec 2020 PALISADE v1.10.6. (2020) https://​gitlab.​com/​palisade/​palisade-release.​ PALISADE Project, Dec 2020
38.
Zurück zum Zitat Al Badawi A et al (2022) OpenFHE: Open-source fully homomorphic encryption library. In: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp 53–63 Al Badawi A et al (2022) OpenFHE: Open-source fully homomorphic encryption library. In: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp 53–63
39.
Zurück zum Zitat SEAL (release 4.0). https://​github.​com/​microsoft/​SEAL.​ Microsoft Research, Redmond, WA, Apr 2020 SEAL (release 4.0). https://​github.​com/​microsoft/​SEAL.​ Microsoft Research, Redmond, WA, Apr 2020
40.
Zurück zum Zitat SEAL–Python (2022) https://​github.​com/​Huelse/​SEAL-Python.​ Microsoft SEAL 4.X For Python, May 2022 SEAL–Python (2022) https://​github.​com/​Huelse/​SEAL-Python.​ Microsoft SEAL 4.X For Python, May 2022
41.
Zurück zum Zitat pybind11 (2021). https://​github.​com/​pybind/​pybind11 pybind11 (2021). https://​github.​com/​pybind/​pybind11
42.
Zurück zum Zitat Montgomery PL (1994) A survey of modern integer factorization algorithms. CWI Quarterly 7(4):337–366 MathSciNetMATH Montgomery PL (1994) A survey of modern integer factorization algorithms. CWI Quarterly 7(4):337–366 MathSciNetMATH
43.
Zurück zum Zitat Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical GapSVP. In: Annual Cryptology Conference. Springer, pp 868–886 Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical GapSVP. In: Annual Cryptology Conference. Springer, pp 868–886
45.
Zurück zum Zitat Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 1–23 Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 1–23
46.
Zurück zum Zitat Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (standard) LWE. SIAM Journal on Computing 43(2):831–871 MathSciNetCrossRefMATH Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (standard) LWE. SIAM Journal on Computing 43(2):831–871 MathSciNetCrossRefMATH
47.
Zurück zum Zitat Rocha VF, López J, Falcão Da Rocha V (2019) An overview on homomorphic encryption algorithms Rocha VF, López J, Falcão Da Rocha V (2019) An overview on homomorphic encryption algorithms
48.
Zurück zum Zitat Rocha VF, López J, Falcão Da Rocha V (2018) An overview on homomorphic encryption algorithms. In: UNICAMP Universidade Estadual de Campinas, Tech Rep Rocha VF, López J, Falcão Da Rocha V (2018) An overview on homomorphic encryption algorithms. In: UNICAMP Universidade Estadual de Campinas, Tech Rep
49.
Zurück zum Zitat Yuan W, Gao H (2020) An efficient BGV-type encryption scheme for IoT systems. Appl Sci 10(17):5732 CrossRef Yuan W, Gao H (2020) An efficient BGV-type encryption scheme for IoT systems. Appl Sci 10(17):5732 CrossRef
50.
Zurück zum Zitat Yongsoo S (2019) Introduction to CKKS. In: Private AI Boot-camp, Microsoft Research Yongsoo S (2019) Introduction to CKKS. In: Private AI Boot-camp, Microsoft Research
51.
Zurück zum Zitat Lee Y et al (2022) Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption. In: Cryptology ePrint Archive Lee Y et al (2022) Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption. In: Cryptology ePrint Archive
52.
Zurück zum Zitat Albrecht M et al (2021) Homomorphic encryption standard. In: Protecting Privacy Through Homomorphic Encryption, pp 31–62 Albrecht M et al (2021) Homomorphic encryption standard. In: Protecting Privacy Through Homomorphic Encryption, pp 31–62
53.
Zurück zum Zitat Doan TVT (2022) Implementation of PHE schemes: El-Gamal, Paillier and RSA. https://​github.​com/​ThaoDoanVan/​PHE.​ May 2022 Doan TVT (2022) Implementation of PHE schemes: El-Gamal, Paillier and RSA. https://​github.​com/​ThaoDoanVan/​PHE.​ May 2022
54.
Zurück zum Zitat Heather J et al (2013) Solving the discrete logarithm problem for packing candidate preferences. In: International Conference on Availability, Reliability, and Security. Springer, pp 209–221 Heather J et al (2013) Solving the discrete logarithm problem for packing candidate preferences. In: International Conference on Availability, Reliability, and Security. Springer, pp 209–221
55.
Zurück zum Zitat Pohlig S, Hellman M (1978)An improved algorithm for computing logarithms over GF (p) and its cryptographic significance (corresp.). IEEE Trans Inf Theory 24(1):106- 110 Pohlig S, Hellman M (1978)An improved algorithm for computing logarithms over GF (p) and its cryptographic significance (corresp.). IEEE Trans Inf Theory 24(1):106- 110
56.
Zurück zum Zitat Bellare M et al (1998) Relations among notions of security for public-key encryption schemes. In: Annual International Cryptology Conference. Springer, pp 26–45 Bellare M et al (1998) Relations among notions of security for public-key encryption schemes. In: Annual International Cryptology Conference. Springer, pp 26–45
57.
Zurück zum Zitat Chenal M, Tang Q (2014) On key recovery attacks against existing somewhat homomorphic encryption schemes. In: International Conference on Cryptology and Information Security in Latin America. Springer, pp 239–258 Chenal M, Tang Q (2014) On key recovery attacks against existing somewhat homomorphic encryption schemes. In: International Conference on Cryptology and Information Security in Latin America. Springer, pp 239–258
58.
Zurück zum Zitat Fauzi P, Hovd MN, Raddum H (2022) On the IND-CCA1 security of FHE schemes. Cryptography 6(1):13 CrossRef Fauzi P, Hovd MN, Raddum H (2022) On the IND-CCA1 security of FHE schemes. Cryptography 6(1):13 CrossRef
60.
Zurück zum Zitat Li B, Micciancio D (2021) On the security of homomorphic encryption on approximate numbers. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 648–677 Li B, Micciancio D (2021) On the security of homomorphic encryption on approximate numbers. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 648–677
61.
Zurück zum Zitat Guo Y, Cao Z, Dong X (2020) A generalization of Paillier’s public-key system with fast decryption. In: Cryptology ePrint Archive Guo Y, Cao Z, Dong X (2020) A generalization of Paillier’s public-key system with fast decryption. In: Cryptology ePrint Archive
62.
Zurück zum Zitat Armknecht F, Katzenbeisser S, Peter A (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography 67(2):209–232 MathSciNetCrossRefMATH Armknecht F, Katzenbeisser S, Peter A (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography 67(2):209–232 MathSciNetCrossRefMATH
63.
Zurück zum Zitat Tsiounis Y, Yung M (1998) On the security of ElGamal based encryption. In: International Workshop on Public Key Cryptography. Springer, pp 117–134 Tsiounis Y, Yung M (1998) On the security of ElGamal based encryption. In: International Workshop on Public Key Cryptography. Springer, pp 117–134
64.
Zurück zum Zitat Wu J, Stinson DR (2008) On the security of the ElGamal encryption scheme and Damgard’s variant. In: Cryptology ePrint Archive Wu J, Stinson DR (2008) On the security of the ElGamal encryption scheme and Damgard’s variant. In: Cryptology ePrint Archive
65.
Zurück zum Zitat JM Pollard (1974) Theorems on factorization and primality testing. In: Mathematical proceedings of the Cambridge philosophical society, vol 76(3). Cambridge University Press, pp 521–528 JM Pollard (1974) Theorems on factorization and primality testing. In: Mathematical proceedings of the Cambridge philosophical society, vol 76(3). Cambridge University Press, pp 521–528
66.
Zurück zum Zitat Doan TVT, Nguyen TMP, Tran DN (2022) Simple methods for factorization. https://​github.​com/​ThaoDoanVan/​ Factorization. Project report. Sciences and Technologies Faculty, University of Limoges, Jan Doan TVT, Nguyen TMP, Tran DN (2022) Simple methods for factorization. https://​github.​com/​ThaoDoanVan/​ Factorization. Project report. Sciences and Technologies Faculty, University of Limoges, Jan
67.
Zurück zum Zitat Loria (2021) Record factors found by Pollard’s p-1 method. https://​members.​loria.​fr/​PZimmermann/​records/​Pminus1.​html Loria (2021) Record factors found by Pollard’s p-1 method. https://​members.​loria.​fr/​PZimmermann/​records/​Pminus1.​html
68.
Zurück zum Zitat Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. IEEE, pp 124–134 Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. IEEE, pp 124–134
69.
Zurück zum Zitat Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332 MathSciNetCrossRefMATH Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332 MathSciNetCrossRefMATH
70.
Zurück zum Zitat Geller MR, Zhou Z (2013) Factoring 51 and 85 with 8 qubits. Scientific Reports 3(1):1–5 CrossRef Geller MR, Zhou Z (2013) Factoring 51 and 85 with 8 qubits. Scientific Reports 3(1):1–5 CrossRef
71.
Zurück zum Zitat Vandersypen LMK et al (2001) Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance. Nature 414(6866):883–887 CrossRef Vandersypen LMK et al (2001) Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance. Nature 414(6866):883–887 CrossRef
72.
Zurück zum Zitat Martin-Lopez E et al (2012) Experimental realization of Shor’s quantum factoring algorithm using qubit recycling. Nature Photonics 6(11):773–776 CrossRef Martin-Lopez E et al (2012) Experimental realization of Shor’s quantum factoring algorithm using qubit recycling. Nature Photonics 6(11):773–776 CrossRef
73.
Zurück zum Zitat Gidney C, Ekerå M (2021) How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 5:433 CrossRef Gidney C, Ekerå M (2021) How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 5:433 CrossRef
75.
Zurück zum Zitat Vedral V, Barenco A, Ekert A (1996) Quantum networks for elementary arithmetic operations. Phys Rev A 54(1):147 MathSciNetCrossRef Vedral V, Barenco A, Ekert A (1996) Quantum networks for elementary arithmetic operations. Phys Rev A 54(1):147 MathSciNetCrossRef
76.
Zurück zum Zitat Beauregard S (2002) Circuit for Shor’s algorithm using 2n+ 3 qubits. In: arXiv preprint quant-ph/0205095 Beauregard S (2002) Circuit for Shor’s algorithm using 2n+ 3 qubits. In: arXiv preprint quant-ph/0205095
77.
Zurück zum Zitat Takahashi Y, Kunihiro N (2006) A quantum circuit for Shor’s factoring algorithm using 2n+ 2 qubits. Quantum Inf Comput 6(2):184–192 MathSciNetMATH Takahashi Y, Kunihiro N (2006) A quantum circuit for Shor’s factoring algorithm using 2n+ 2 qubits. Quantum Inf Comput 6(2):184–192 MathSciNetMATH
78.
Zurück zum Zitat Häner T, Roetteler M, Svore KM (2016) Factoring using 2n+ 2 qubits with Toffoli based modular multiplication. In: arXiv preprint arXiv:​1611.​07995 Häner T, Roetteler M, Svore KM (2016) Factoring using 2n+ 2 qubits with Toffoli based modular multiplication. In: arXiv preprint arXiv:​1611.​07995
80.
Zurück zum Zitat Suo J et al (2020) Quantum algorithms for typical hard problems: a perspective of cryptanalysis. Quantum Inf Process 19(6):1–26 MathSciNetCrossRefMATH Suo J et al (2020) Quantum algorithms for typical hard problems: a perspective of cryptanalysis. Quantum Inf Process 19(6):1–26 MathSciNetCrossRefMATH
81.
Zurück zum Zitat Proos J, Zalka C (2003) Shor’s discrete logarithm quantum algorithm for elliptic curves. In: arXiv preprint quant-ph/0301141 Proos J, Zalka C (2003) Shor’s discrete logarithm quantum algorithm for elliptic curves. In: arXiv preprint quant-ph/0301141
82.
Metadaten
Titel
A survey on implementations of homomorphic encryption schemes
verfasst von
Thi Van Thao Doan
Mohamed-Lamine Messai
Gérald Gavin
Jérôme Darmont
Publikationsdatum
14.04.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 13/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05233-z

Weitere Artikel der Ausgabe 13/2023

The Journal of Supercomputing 13/2023 Zur Ausgabe

Premium Partner