Skip to main content

Table 1 The comparison between Canetti et al.’s scheme and our scheme

From: CCA1 secure FHE from PIO, revisited

Scheme

Secret key

Number of computation for addition

Number of computation for multiplication

Canetti et al.’s Scheme

An obfuscation of

t

t2+t

 

some decryption circuit

  

Our Scheme

The secret key of a trapdoor encryption scheme

1

1

  1. 1Here t is the number of inputs for a circuit, which consists of addition gates and multiplication gates