A brief survey on encrypted control: From the first to the second generation and beyond

N Schlüter, P Binfet, MS Darup - Annual Reviews in Control, 2023 - Elsevier
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

A guide to fully homomorphic encryption

F Armknecht, C Boyd, C Carr, K Gjøsteen… - Cryptology ePrint …, 2015 - eprint.iacr.org
Fully homomorphic encryption (FHE) has been dubbed the holy grail of cryptography, an
elusive goal which could solve the IT world's problems of security and trust. Research in the …

Functional signatures and pseudorandom functions

E Boyle, S Goldwasser, I Ivan - International workshop on public key …, 2014 - Springer
We introduce two new cryptographic primitives: functional digital signatures and functional
pseudorandom functions. In a functional signature scheme, in addition to a master signing …

Leveled fully homomorphic signatures from standard lattices

S Gorbunov, V Vaikuntanathan, D Wichs - Proceedings of the forty …, 2015 - dl.acm.org
In a homomorphic signature scheme, a user Alice signs some large dataset x using her
secret signing key and uploads the signed data to an untrusted remote server. The server …

Efficiently verifiable computation on encrypted data

D Fiore, R Gennaro, V Pastro - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
We study the task of verifiable delegation of computation on encrypted data. We improve
previous definitions in order to tolerate adversaries that learn whether or not clients accept …

Verifiable fully homomorphic encryption

A Viand, C Knabenhans, A Hithnawi - arXiv preprint arXiv:2301.07041, 2023 - arxiv.org
Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect
data in use by allowing computation over encrypted data. However, the same malleability …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

Toward a secure drone system: Flying with real-time homomorphic authenticated encryption

JH Cheon, K Han, SM Hong, HJ Kim, J Kim… - IEEE …, 2018 - ieeexplore.ieee.org
Controlling or accessing remotely has become a prevalent form of operating numerous
types of platforms and infrastructure. An exploding number of vehicles such as drones or …

Taking {Proof-Based} verified computation a few steps closer to practicality

S Setty, V Vu, N Panpalia, B Braun… - 21st USENIX Security …, 2012 - usenix.org
We describe GINGER, a built system for unconditional, general-purpose, and nearly
practical verification of outsourced computation. GINGER is based on PEPPER, which uses …