Noah's Ark: Efficient Threshold-FHE Using Noise Flooding
M Dahl, D Demmler, S El Kazdadi, A Meyre… - Proceedings of the 11th …, 2023 - dl.acm.org
We outline a secure and efficient methodology to do threshold distributed decryption for
LWE based Fully Homomorphic Encryption schemes. Due to the smaller parameters used in …
LWE based Fully Homomorphic Encryption schemes. Due to the smaller parameters used in …
Pelta-shielding multiparty-FHE against malicious adversaries
Multiparty fully homomorphic encryption (MFHE) schemes enable multiple parties to
efficiently compute functions on their sensitive data while retaining confidentiality. However …
efficiently compute functions on their sensitive data while retaining confidentiality. However …
Threshold raccoon: Practical threshold signatures from standard lattice assumptions
R Del Pino, S Katsumata, M Maller… - … Conference on the …, 2024 - Springer
Threshold signatures improve both availability and security of digital signatures by splitting
the signing key into N shares handed out to different parties. Later on, any subset of at least …
the signing key into N shares handed out to different parties. Later on, any subset of at least …
Two-round threshold signature from algebraic one-more learning with errors
T Espitau, S Katsumata, K Takemure - Annual International Cryptology …, 2024 - Springer
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …
[PDF][PDF] Multiparty homomorphic encryption: From theory to practice
CV Mouchet - 2023 - infoscience.epfl.ch
Multiparty homomorphic encryption (MHE) enables a group of parties to encrypt data in a
way that (i) enables the evaluation of functions directly over its ciphertexts and (ii) enforces a …
way that (i) enables the evaluation of functions directly over its ciphertexts and (ii) enforces a …
Combining homomorphic encryption and differential privacy in federated learning
Recent works have investigated the relevance and practicality of using techniques such as
Differential Privacy (DP) or Homomorphic Encryption (HE) to strengthen training data privacy …
Differential Privacy (DP) or Homomorphic Encryption (HE) to strengthen training data privacy …
Round-Optimal, Fully Secure Distributed Key Generation
J Katz - Annual International Cryptology Conference, 2024 - Springer
Protocols for distributed (threshold) key generation (DKG) in the discrete-logarithm setting
have received a tremendous amount of attention in the past few years. Several synchronous …
have received a tremendous amount of attention in the past few years. Several synchronous …
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
D Micciancio, A Suhl - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In LWE based cryptosystems, using small (polynomially large) ciphertext modulus improves
both efficiency and security. In threshold encryption, one often needs" simulation security" …
both efficiency and security. In threshold encryption, one often needs" simulation security" …
Threshold Fully Homomorphic Encryption Over the Torus
Fully homomorphic encryption (FHE) enables arithmetic operations to be performed over
plaintext by operations on undecrypted ciphertext. The Chillotti-Gama-Georgieva …
plaintext by operations on undecrypted ciphertext. The Chillotti-Gama-Georgieva …
全同态加密技术的研究现状及发展路线综述
戴怡然, 张江, 向斌武, 邓燚 - 电子与信息学报, 2024 - jeit.ac.cn
随着物联网, 云计算, 人工智能的应用与普及, 数据安全与隐私保护成为人们关注的焦点.
全同态加密, 作为隐私安全问题的有效解决办法, 允许对加密数据执行任意同态计算 …
全同态加密, 作为隐私安全问题的有效解决办法, 允许对加密数据执行任意同态计算 …