Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT

N Zhang, B Yang, C Chen, S Yin, S Wei… - IACR Transactions on …, 2020 - tches.iacr.org
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …

Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers

K Gai, M Qiu - IEEE Transactions on Industrial Informatics, 2017 - ieeexplore.ieee.org
Recent booming growth of networking-based solutions have brought numerous challenges
to security and privacy from both perspectives of insider and outsider threats. The encrypted …

Privacy protection in smart meters using homomorphic encryption: An overview

Z Abreu, L Pereira - Wiley Interdisciplinary Reviews: Data …, 2022 - Wiley Online Library
This article presents an overview of the literature on privacy protection in smart meters with a
particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart …

Hardware architecture of a number theoretic transform for a bootstrappable RNS-based homomorphic encryption scheme

S Kim, K Lee, W Cho, Y Nam, JH Cheon… - 2020 IEEE 28th …, 2020 - ieeexplore.ieee.org
Homomorphic encryption (HE) is one of the most promising solutions to secure cloud
computing. The number theoretic transform (NTT) that is widely used for convolution …

Verifiable encodings for secure homomorphic analytics

S Chatel, C Knabenhans, A Pyrgelis… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …

APAS: Application-specific accelerators for RLWE-based homomorphic linear transformations

S Bian, DES Kundi, K Hirozawa… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, the application of multi-party secure computing schemes based on homomorphic
encryption in the field of machine learning attracts attentions across the research fields …

Setup-free secure search on encrypted data: Faster and post-processing free

A Akavia, C Gentry, S Halevi, M Leibovich - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present a novel $\textit {secure search} $ protocol on data and queries encrypted with
Fully Homomorphic Encryption (FHE). Our protocol enables organizations (client) to (1) …

Secure search on encrypted data via multi-ring sketch

A Akavia, D Feldman, H Shaul - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We consider the secure search problem of retrieving from an unsorted data cost=(x_1,..., xm)
an item (i, xi) matching a given lookup value l (for a generic matching criterion either …

An ultra-highly parallel polynomial multiplier for the bootstrapping algorithm in a fully homomorphic encryption scheme

W Tan, BM Case, G Hu, S Gao, Y Lao - Journal of Signal Processing …, 2021 - Springer
Fully homomorphic encryption (FHE) is a post-quantum secure cryptographic technology
that enables privacy-preserving computing on an untrusted platform without divulging any …