Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …
Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers
Recent booming growth of networking-based solutions have brought numerous challenges
to security and privacy from both perspectives of insider and outsider threats. The encrypted …
to security and privacy from both perspectives of insider and outsider threats. The encrypted …
Privacy protection in smart meters using homomorphic encryption: An overview
Z Abreu, L Pereira - Wiley Interdisciplinary Reviews: Data …, 2022 - Wiley Online Library
This article presents an overview of the literature on privacy protection in smart meters with a
particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart …
particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart …
Hardware architecture of a number theoretic transform for a bootstrappable RNS-based homomorphic encryption scheme
Homomorphic encryption (HE) is one of the most promising solutions to secure cloud
computing. The number theoretic transform (NTT) that is widely used for convolution …
computing. The number theoretic transform (NTT) that is widely used for convolution …
Verifiable encodings for secure homomorphic analytics
S Chatel, C Knabenhans, A Pyrgelis… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
APAS: Application-specific accelerators for RLWE-based homomorphic linear transformations
Recently, the application of multi-party secure computing schemes based on homomorphic
encryption in the field of machine learning attracts attentions across the research fields …
encryption in the field of machine learning attracts attentions across the research fields …
Setup-free secure search on encrypted data: Faster and post-processing free
We present a novel $\textit {secure search} $ protocol on data and queries encrypted with
Fully Homomorphic Encryption (FHE). Our protocol enables organizations (client) to (1) …
Fully Homomorphic Encryption (FHE). Our protocol enables organizations (client) to (1) …
Secure search on encrypted data via multi-ring sketch
We consider the secure search problem of retrieving from an unsorted data cost=(x_1,..., xm)
an item (i, xi) matching a given lookup value l (for a generic matching criterion either …
an item (i, xi) matching a given lookup value l (for a generic matching criterion either …
An ultra-highly parallel polynomial multiplier for the bootstrapping algorithm in a fully homomorphic encryption scheme
Fully homomorphic encryption (FHE) is a post-quantum secure cryptographic technology
that enables privacy-preserving computing on an untrusted platform without divulging any …
that enables privacy-preserving computing on an untrusted platform without divulging any …