Table 2.
Summary of the security parameters for the algorithms to run under -bit security level. Security implementation is based on the Microsoft SEAL library. N is the polynomial ring size, is the coefficient modulus size, is the scaling factor, and L is the multiplicative depth of the HE algorithm
Method | N | L3 | ||
---|---|---|---|---|
“Unsupervised method” section | 218 / 188 | 30 | 4 / 3 | |
“Clustering-based supervised method” section | 109 | 29 | 1 | |
“Linear regression method” section | 109 | 29 | 1 |
3L refers to the multiplicative depth of the algorithm and determines the size of . The symbol / indicates another parameterization where L and are different