Research Article
Privacy Protection of IoT Based on Fully Homomorphic Encryption
Table 2
Experimental results for our batched bootstrapping and HS.
| cyclotomic ring | plaintext space | number of slots | security level | total recrypt (sec) | space usage (GB) | Our work | HS’ work | Our work | HS’ work |
| | | 1024 | 76 | 97 | 172 | 2.3 | 3.0 | | | 720 | 110 | 168 | 235 | 2.6 | 3.2 | | | 1000 | 106 | 1475 | 2037 | 11.2 | 13.8 | | | 1296 | 161 | 984 | 1461 | 31.7 | 36.4 |
|
|