TFHE: fast fully homomorphic encryption over the torus
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …
Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds
I Chillotti, N Gama, M Georgieva… - Advances in Cryptology …, 2016 - Springer
In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring
variants. We notice that the internal product of GSW can be replaced by a simpler external …
variants. We notice that the internal product of GSW can be replaced by a simpler external …
Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted
data. Ló pez-Alt et al.(STOC 2012) proposed a generalized notion of HE, called Multi-Key …
data. Ló pez-Alt et al.(STOC 2012) proposed a generalized notion of HE, called Multi-Key …
Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE
I Chillotti, N Gama, M Georgieva… - … Conference on the Theory …, 2017 - Springer
In this paper, we present several methods to improve the evaluation of homomorphic
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …
Computing blindfolded on data homomorphically encrypted under multiple keys: A survey
With capability of performing computations on encrypted data without needing the secret
key, homomorphic encryption (HE) is a promising cryptographic technique that makes …
key, homomorphic encryption (HE) is a promising cryptographic technique that makes …
Threshold cryptosystems from threshold fully homomorphic encryption
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
There are two competing approaches to bootstrap the FHEW fully homomorphic encryption
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …
FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things
Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide
massive data storage services. To ensure the confidentiality, sensitive industrial data need …
massive data storage services. To ensure the confidentiality, sensitive industrial data need …
Chimera: Combining ring-lwe-based fully homomorphic encryption schemes
This paper proposes a practical hybrid solution for combining and switching between three
popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first …
popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first …
Two-round multiparty secure computation from minimal assumptions
S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …