{"id":"https://openalex.org/W2974626533","doi":"https://doi.org/10.1145/3345252.3345292","title":"Evaluation of the Complexity of Fully Homomorphic Encryption Schemes in Implementations of Programs","display_name":"Evaluation of the Complexity of Fully Homomorphic Encryption Schemes in Implementations of Programs","publication_year":2019,"publication_date":"2019-06-21","ids":{"openalex":"https://openalex.org/W2974626533","doi":"https://doi.org/10.1145/3345252.3345292","mag":"2974626533"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3345252.3345292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031393169","display_name":"Dimitar Chakarov","orcid":"https://orcid.org/0000-0002-2312-5725"},"institutions":[{"id":"https://openalex.org/I192878625","display_name":"Plovdiv University","ror":"https://ror.org/0545p3742","country_code":"BG","type":"education","lineage":["https://openalex.org/I192878625"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Dimitar Chakarov","raw_affiliation_strings":["High School of Mathematics 'Acad. Kiril Popov', Plovdiv, Bulgaria"],"affiliations":[{"raw_affiliation_string":"High School of Mathematics 'Acad. Kiril Popov', Plovdiv, Bulgaria","institution_ids":["https://openalex.org/I192878625"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066356802","display_name":"Yavor Papazov","orcid":null},"institutions":[],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Yavor Papazov","raw_affiliation_strings":["ESI -- CEE, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"ESI -- CEE, Sofia, Bulgaria","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.274,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.40317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":81},"biblio":{"volume":null,"issue":null,"first_page":"62","last_page":"67"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.9545864},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.82348746},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.5221496}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9545864},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.82348746},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82207114},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6623551},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6247927},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.5221496},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5002961},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18964815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17254812},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11098564},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3345252.3345292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W1562767160","https://openalex.org/W2031533839","https://openalex.org/W2606882085","https://openalex.org/W2949073274"],"related_works":["https://openalex.org/W4401752887","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W4313300189","https://openalex.org/W3012147850","https://openalex.org/W2977179488","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W2539930818","https://openalex.org/W2120447654"],"abstract_inverted_index":{"This":[0],"paper":[1],"shows":[2],"a":[3],"thorough":[4],"examination":[5],"of":[6,21,55,84,88],"fully":[7,56,85],"homomorphic":[8,57,86],"encryption":[9],"schemes":[10],"and":[11,30,37],"their":[12],"performance":[13,54,83],"in":[14],"programs.":[15,91],"We":[16,39,65],"do":[17],"an":[18,43,67],"extensive":[19],"analysis":[20],"one":[22],"specific,":[23],"widely-used":[24],"scheme":[25],"--":[26,33],"the":[27,34,51,71,82],"Gentry-Sahai-Waters":[28],"scheme,":[29],"its":[31],"variations":[32],"libraries":[35],"TFHE":[36],"FHEW.":[38],"aim":[40],"to":[41,49,80],"devise":[42],"abstraction":[44],"level":[45],"that":[46,69],"enables":[47],"us":[48],"assess":[50],"real-world":[52],"speed":[53],"operations":[58],"without":[59],"actually":[60],"working":[61],"with":[62,76],"encrypted":[63],"data.":[64],"propose":[66],"algorithm":[68],"uses":[70],"gathered":[72],"statistical":[73],"data":[74],"combined":[75],"our":[77],"mathematical":[78],"model":[79],"evaluate":[81],"implementations":[87],"arbitrary":[89],"computer":[90]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2974626533","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2025-01-10T01:33:38.257692","created_date":"2019-09-26"}