Skip to main content

Table 1 The comparison between Canetti et al.’s scheme and our scheme

From: CCA1 secure FHE from PIO, revisited

Scheme Secret key Number of computation for addition Number of computation for multiplication
Canetti et al.’s Scheme An obfuscation of t t2+t
  some decryption circuit   
Our Scheme The secret key of a trapdoor encryption scheme 1 1
  1. 1Here t is the number of inputs for a circuit, which consists of addition gates and multiplication gates