TFHE: fast fully homomorphic encryption over the torus

I Chillotti, N Gama, M Georgieva, M Izabachène - Journal of Cryptology, 2020 - Springer
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …

Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds

I Chillotti, N Gama, M Georgieva… - Advances in Cryptology …, 2016 - Springer
In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring
variants. We notice that the internal product of GSW can be replaced by a simpler external …

Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference

H Chen, W Dai, M Kim, Y Song - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted
data. Ló pez-Alt et al.(STOC 2012) proposed a generalized notion of HE, called Multi-Key …

Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE

I Chillotti, N Gama, M Georgieva… - … Conference on the Theory …, 2017 - Springer
In this paper, we present several methods to improve the evaluation of homomorphic
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …

Computing blindfolded on data homomorphically encrypted under multiple keys: A survey

A Aloufi, P Hu, Y Song, K Lauter - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
With capability of performing computations on encrypted data without needing the secret
key, homomorphic encryption (HE) is a promising cryptographic technique that makes …

Threshold cryptosystems from threshold fully homomorphic encryption

D Boneh, R Gennaro, S Goldfeder, A Jain… - Advances in Cryptology …, 2018 - Springer
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …

Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption

Y Lee, D Micciancio, A Kim, R Choi, M Deryabin… - … Conference on the …, 2023 - Springer
There are two competing approaches to bootstrap the FHEW fully homomorphic encryption
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …

FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things

X Zhang, C Xu, H Wang, Y Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide
massive data storage services. To ensure the confidentiality, sensitive industrial data need …

Chimera: Combining ring-lwe-based fully homomorphic encryption schemes

C Boura, N Gama, M Georgieva… - Journal of Mathematical …, 2020 - degruyter.com
This paper proposes a practical hybrid solution for combining and switching between three
popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first …

Two-round multiparty secure computation from minimal assumptions

S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …