Skip to main content

Advertisement

Table 1 Comparisons with lattice-based cryptosystems

From: A simple lattice-based PKE scheme

Pub Pub.size Cipher.size Enc.Comp. Dec.Comp. Priv.size Plaint.size
Regev (2005) \(2(n+1)n\log^2q\) \(n\log^2q+\log q\) \(2n^2\log q\) n \(n\log q \) 1
Lindner and Peikert (2011) \(2n^2\log q\) \(2n\log q \) \(3n^2 \) \(n^2\) \(n^2\log q\) \(n \log q \)
Gentry et al. (2010) \(2n^2log^2q\) \(4n^2log^3q\) \(4n^2log^2q(n+1)\) \(8n^3log^3q(1+24n^3log^3q)\) \(4n^2log^3q\) \(4n^2log^2q\)
Ours \(2n\log^2 q(2n\log q+1) \) \(2n\log^2 q+\log q\) \(2n\log q(2n\log q+1)\) \(2n\log q\) \(2n\log^2 q\) \(\log q\)