We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Interview with Kyoohyung Han at EuroCrypt 2018 on the topic of Bootstrapping and Homomorphic Encryption

Kristina Perunicic Managing Editor

Kyoohyung Han is a PhD student in the Department of Mathematical Science at the Seoul National University in Korea. He recently gave a presentation at EuroCrypt 2018 titled Homomorphic Lower Digit Removal and Improved FHE Bootstrapping. He was generous enough to give me a few minutes of his time and talk a little more about his research and the importance of bootstrapping and homomorphic encryption.

KyooHyung Han at a conference

Why is Bootstrapping important?

In broad terms, homomorphic encryption software typically provides a finite set of operations. With the aid of bootstrapping, we can transcend this constraint, thereby enabling us to perform an unlimited number of operations while the data remains encrypted.

What separates your method from previous methods?

With our method we have changed the middle step in bootstrapping. There is a process called Homomorphic Bit Extraction.

In our process, our method has lower depth and lower complexity. In our method, we use one more polynomial which is called Lowest Digit Removal Polynomial. In previous methods they used 3 kinds of function and our method uses 4 functions.

What is the advantage to your method?

It quicker and with smaller parameters

Are there any real life applications for your improved method?

In the cases of machine learning and data analysis in the encrypted states, you would need large depth computation of encrypted data. So we need to insert bootstrapping steps for every 5 or 6 situations so that the performance of bootstrapping goes well then this kind of application will go well.

If someone wants to use homomorphic encryption in the future, then bootstrapping will be necessary. Maybe if you are just using a simple application you wouldn't need any bootstrapping. But usually, when you have large depth computation the bootstrapping will be necessary.

Here is the complete presentation that Kyoohyung Han created for his talk on Lower Digit Removal and Improved FHE Bootstrapping at EuroCrypt 2018

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Kristina Perunicic is a former editor for vpnMentor. She’s a cybersecurity expert with an interest in VPNs and their importance in the digital privacy landscape.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.