Browse Source

Update README.md

BGN2 6 years ago
parent
commit
ef0e9d7ce4
1 changed files with 8 additions and 2 deletions
  1. 8 2
      README.md

+ 8 - 2
README.md

@@ -8,10 +8,16 @@ BGN2 is a free software, it is the implementation of scheme described in the art
 by Vincent Herbert, Bhaskar Biswas and Caroline Fontaine.
 
 # Description
-Our scheme is based on an improvement of [BGN05], that we call BGN-F-CF, and which can homomorphically evaluate polynomial of degree at most 4. This solution provides smaller ciphertexts than lattice based solutions, and its security is based on a hard problem that has been investigated in depth. More precisely, it employs together two improvements of the original BGN scheme [BGN05], based on [F10] and [CF15]. Only Freeman's work [F10] has already been coupled with BGN in [G13A,G13B] to greatly improve BGN's speed, resulting in a scheme that we call here BGNF. To our knowledge, it is the first time that Catalone and Fiore's construction [CF15] is applied to this particular setting in order to add one more multiplicative depth.
+Our scheme is based on an improvement of [BGN05], that we call BGN-F-CF, and which can homomorphically evaluate polynomial of degree at most 4. This solution provides smaller ciphertexts than lattice based solutions, and its security is based on a hard problem that has been investigated in depth. More precisely, it employs together two improvements of the original BGN scheme [BGN05], based on [F10] and [CF15]. Only Freeman's work [F10] has already been coupled with BGN in [G13A,G13B] to greatly improve BGN's speed, resulting in a scheme that we call here BGN-F. To our knowledge, it is the first time that Catalone and Fiore's construction [CF15] is applied to this particular setting in order to add one more multiplicative depth.
 
 # Dependencies and Installation
-To use the library, one need to install the DCLXVI library. Then copy/clone the folders. Go to /src directory and make
+To use the program, copy/clone the repository, go to /src directory and use make command to construct binaries in /bin directory.
+
+Additional options in Makefile and more info using the flag -h with binaries.
+
+For C/C++ compatibility reasons wih our program, the dependency dclxvi-20130329 is included in the repository.
+
+https://github.com/BGN2/BGN2/tree/master/dclxvi-20130329
 
 # References
 [BGN05] : Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In Joe Kilian, editor, Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, volume 3378 of Lecture Notes in Computer Science, pages 325–341. Springer, 2005.