Homomorphic encryption for machine learning in medicine and bioinformatics

A Wood, K Najarian, D Kahrobaei - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …

A survey on fully homomorphic encryption: An engineering perspective

P Martins, L Sousa, A Mariano - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …

Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data

N Samardzic, A Feldmann, A Krastev… - Proceedings of the 49th …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …

F1: A fast and programmable accelerator for fully homomorphic encryption

N Samardzic, A Feldmann, A Krastev… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …

A framework for secure and decentralized sharing of medical imaging data via blockchain consensus

V Patel - Health informatics journal, 2019 - journals.sagepub.com
The electronic sharing of medical imaging data is an important element of modern
healthcare systems, but current infrastructure for cross-site image transfer depends on trust …

Attacks Against the IND-CPAD Security of Exact FHE Schemes

JH Cheon, H Choe, A Passelègue, D Stehlé… - Proceedings of the …, 2024 - dl.acm.org
A recent security model for fully homomorphic encryption (FHE), called IND-CPAD security
and introduced by Li and Micciancio [Eurocrypt'21], strengthens IND-CPA security by giving …

HEAX: An architecture for computing on encrypted data

MS Riazi, K Laine, B Pelton, W Dai - Proceedings of the twenty-fifth …, 2020 - dl.acm.org
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …

A resource-efficient encryption algorithm for multimedia big data

S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2017 - Springer
Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in
the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT …

FPT: A fixed-point accelerator for torus fully homomorphic encryption

M Van Beirendonck, JP D'Anvers, F Turan… - Proceedings of the …, 2023 - dl.acm.org
Fully Homomorphic Encryption (FHE) is a technique that allows computation on encrypted
data. It has the potential to drastically change privacy considerations in the cloud, but high …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …