From: Private genome analysis through homomorphic encryption
BGV
YASHE
Log2 q
( M ⋅ log 2 ( h ⋅ n ⋅ t 4 ) 36 + 3 ) ⋅ ( 11 + 1 2 log 2 n )
2M · log2 nt
|ct|
2n ( M ⋅ log 2 ( h ⋅ n ⋅ t 4 ) 36 + 3 ) ⋅ ( 11 + 1 2 log 2 n )
2nM · log2 nt