|
@@ -8,10 +8,16 @@ BGN2 is a free software, it is the implementation of scheme described in the art
|
|
|
by Vincent Herbert, Bhaskar Biswas and Caroline Fontaine.
|
|
|
|
|
|
# Description
|
|
|
-Our scheme is based on an improvement of [BGN05], that we call BGN-F-CF, and which can homomorphically evaluate polynomial of degree at most 4. This solution provides smaller ciphertexts than lattice based solutions, and its security is based on a hard problem that has been investigated in depth. More precisely, it employs together two improvements of the original BGN scheme [BGN05], based on [F10] and [CF15]. Only Freeman's work [F10] has already been coupled with BGN in [G13A,G13B] to greatly improve BGN's speed, resulting in a scheme that we call here BGNF. To our knowledge, it is the first time that Catalone and Fiore's construction [CF15] is applied to this particular setting in order to add one more multiplicative depth.
|
|
|
+Our scheme is based on an improvement of [BGN05], that we call BGN-F-CF, and which can homomorphically evaluate polynomial of degree at most 4. This solution provides smaller ciphertexts than lattice based solutions, and its security is based on a hard problem that has been investigated in depth. More precisely, it employs together two improvements of the original BGN scheme [BGN05], based on [F10] and [CF15]. Only Freeman's work [F10] has already been coupled with BGN in [G13A,G13B] to greatly improve BGN's speed, resulting in a scheme that we call here BGN-F. To our knowledge, it is the first time that Catalone and Fiore's construction [CF15] is applied to this particular setting in order to add one more multiplicative depth.
|
|
|
|
|
|
# Dependencies and Installation
|
|
|
-To use the library, one need to install the DCLXVI library. Then copy/clone the folders. Go to /src directory and make
|
|
|
+To use the program, copy/clone the repository, go to /src directory and use make command to construct binaries in /bin directory.
|
|
|
+
|
|
|
+Additional options in Makefile and more info using the flag -h with binaries.
|
|
|
+
|
|
|
+For C/C++ compatibility reasons wih our program, the dependency dclxvi-20130329 is included in the repository.
|
|
|
+
|
|
|
+https://github.com/BGN2/BGN2/tree/master/dclxvi-20130329
|
|
|
|
|
|
# References
|
|
|
[BGN05] : Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In Joe Kilian, editor, Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, volume 3378 of Lecture Notes in Computer Science, pages 325–341. Springer, 2005.
|