Implementation of collective decryption & bootstrapping #358
-
Hi, a straightforward implementation of decryption & bootstrapping seem like this:
It seems to me that all secrets are sealed by RLWE problem and insufficient betrayers. So my question is, whether this implementation is safe (semantically secure if not all parties are betrayers) and correct. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
Hi @PenguinLeee, I have converted your issue to a discussion, since it isn't directly related to the Lattigo library (see README.md). You are correct, this is the underlying idea of Protocol 5 in https://eprint.iacr.org/2020/304. This protocol is implemented for all three schemes in the Lattigo library:
|
Beta Was this translation helpful? Give feedback.
Hi @PenguinLeee,
I have converted your issue to a discussion, since it isn't directly related to the Lattigo library (see README.md).
You are correct, this is the underlying idea of Protocol 5 in https://eprint.iacr.org/2020/304. This protocol is implemented for all three schemes in the Lattigo library:
lattigo/dbfv/refresh.go
lattigo/dbgv/refresh.go
lattigo/dckks/refresh.go