Skip to main content

Table 1 Chosen parameters ( n , q , t , σ ) of the SHE scheme for the secure inner product ( 6 ) over packed ciphertexts ( δ denotes the corresponding root Hermite factor, and t Adv the estimated running time of the distinguishing attack given by equation ( 9 ))

From: Secret computation of purchase history data using somewhat homomorphic encryption

 

n

q

t

σ

δ

t Adv

(i)

2048

61-bit

n

8

1.00499

140-bit

(ii)

4096

65-bit

n

8

1.00266

400-bit

(iii)

8192

69-bit

n

8

1.00141

775-bit

(iv)

16384

73-bit

n

8

1.00075

1554-bit