Skip to main content

Table 1 Chosen parameters ( n , q , t , σ ) of the SHE scheme for the secure inner product ( 6 ) over packed ciphertexts ( δ denotes the corresponding root Hermite factor, and t Adv the estimated running time of the distinguishing attack given by equation ( 9 ))

From: Secret computation of purchase history data using somewhat homomorphic encryption

  n q t σ δ t Adv
(i) 2048 61-bit n 8 1.00499 140-bit
(ii) 4096 65-bit n 8 1.00266 400-bit
(iii) 8192 69-bit n 8 1.00141 775-bit
(iv) 16384 73-bit n 8 1.00075 1554-bit