A brief survey on encrypted control: From the first to the second generation and beyond
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
A guide to fully homomorphic encryption
Fully homomorphic encryption (FHE) has been dubbed the holy grail of cryptography, an
elusive goal which could solve the IT world's problems of security and trust. Research in the …
elusive goal which could solve the IT world's problems of security and trust. Research in the …
Functional signatures and pseudorandom functions
E Boyle, S Goldwasser, I Ivan - International workshop on public key …, 2014 - Springer
We introduce two new cryptographic primitives: functional digital signatures and functional
pseudorandom functions. In a functional signature scheme, in addition to a master signing …
pseudorandom functions. In a functional signature scheme, in addition to a master signing …
Leveled fully homomorphic signatures from standard lattices
In a homomorphic signature scheme, a user Alice signs some large dataset x using her
secret signing key and uploads the signed data to an untrusted remote server. The server …
secret signing key and uploads the signed data to an untrusted remote server. The server …
Efficiently verifiable computation on encrypted data
We study the task of verifiable delegation of computation on encrypted data. We improve
previous definitions in order to tolerate adversaries that learn whether or not clients accept …
previous definitions in order to tolerate adversaries that learn whether or not clients accept …
Verifiable fully homomorphic encryption
Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect
data in use by allowing computation over encrypted data. However, the same malleability …
data in use by allowing computation over encrypted data. However, the same malleability …
Verifiable delegation of computation on outsourced data
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …
server in such a way that, at any moment, the client can ask the server to compute a function …
Toward a secure drone system: Flying with real-time homomorphic authenticated encryption
Controlling or accessing remotely has become a prevalent form of operating numerous
types of platforms and infrastructure. An exploding number of vehicles such as drones or …
types of platforms and infrastructure. An exploding number of vehicles such as drones or …
Taking {Proof-Based} verified computation a few steps closer to practicality
We describe GINGER, a built system for unconditional, general-purpose, and nearly
practical verification of outsourced computation. GINGER is based on PEPPER, which uses …
practical verification of outsourced computation. GINGER is based on PEPPER, which uses …