REED: Chiplet-based accelerator for fully homomorphic encryption

A Aikata, AC Mert, S Kwon, M Deryabin… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and
has many applications. However, its practical implementation faces massive computation …

Accelerating finite-field and torus fhe via compute-enabled (s) ram

J Takeshita, D Reis, T Gong, M Niemier… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) allows outsourced computation on clients' encrypted
data while preserving data privacy. FHE's high computational intensity incurs high overhead …

Accelerator for computing on encrypted data

SS Roy, AC Mert, S Kwon, Y Shin, D Yoo - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Fully homomorphic encryption enables computation on encrypted data, and hence it has a
great potential in privacy-preserving outsourcing of computations. In this paper, we present a …

Homomorphic Encryption Library, Framework, Toolkit and Accelerator: A Review

S Dhiman, GK Mahato, SK Chakraborty - SN Computer Science, 2023 - Springer
Homomorphic encryption ensures secure computation on encrypted data without the need
for decryption beforehand. It enables the secure offloading of computations to untrusted …

Accelerating polynomial modular multiplication with crossbar-based compute-in-memory

M Li, H Geng, M Niemier, XS Hu - 2023 IEEE/ACM International …, 2023 - ieeexplore.ieee.org
Lattice-based cryptographic algorithms built on ring learning with error theory are gaining
importance due to their potential for providing post-quantum security. However, these …

Slap: simpler, improved private stream aggregation from ring learning with errors

J Takeshita, R Karl, T Gong, T Jung - Journal of Cryptology, 2023 - Springer
Abstract Private Stream Aggregation (PSA) protocols perform secure aggregation of time-
series data without leaking information about users' inputs to the aggregator. Previous work …

Ppimce: An in-memory computing fabric for privacy preserving computing

H Geng, J Mo, D Reis, J Takeshita, T Jung… - arXiv preprint arXiv …, 2023 - arxiv.org
Privacy has rapidly become a major concern/design consideration. Homomorphic
Encryption (HE) and Garbled Circuits (GC) are privacy-preserving techniques that support …

TERSE: tiny encryptions and really speedy execution for post-quantum private stream aggregation

J Takeshita, Z Carmichael, R Karl, T Jung - International Conference on …, 2022 - Springer
The massive scale and performance demands of privacy-preserving data aggregation make
integration of security and privacy difficult. Traditional tools in private computing are not well …

Gps: Integration of graphene, palisade, and sgx for large-scale aggregations of distributed data

J Takeshita, C McKechney, J Pajak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Secure computing methods such as fully homomorphic encryption and hardware solutions
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …

Provably secure contact tracing with conditional private set intersection

J Takeshita, R Karl, A Mohammed, A Striegel… - Security and Privacy in …, 2021 - Springer
The novel coronavirus COVID-19 spreads easily through personal contact, requiring the use
of contact tracing to track the spread of the disease. Many existing approaches either trust a …