Skip to main content

Table 1 Comparisons with lattice-based cryptosystems

From: A simple lattice-based PKE scheme

Pub

Pub.size

Cipher.size

Enc.Comp.

Dec.Comp.

Priv.size

Plaint.size

Regev (2005)

\(2(n+1)n\log^2q\)

\(n\log^2q+\log q\)

\(2n^2\log q\)

n

\(n\log q \)

1

Lindner and Peikert (2011)

\(2n^2\log q\)

\(2n\log q \)

\(3n^2 \)

\(n^2\)

\(n^2\log q\)

\(n \log q \)

Gentry et al. (2010)

\(2n^2log^2q\)

\(4n^2log^3q\)

\(4n^2log^2q(n+1)\)

\(8n^3log^3q(1+24n^3log^3q)\)

\(4n^2log^3q\)

\(4n^2log^2q\)

Ours

\(2n\log^2 q(2n\log q+1) \)

\(2n\log^2 q+\log q\)

\(2n\log q(2n\log q+1)\)

\(2n\log q\)

\(2n\log^2 q\)

\(\log q\)