REED: Chiplet-based accelerator for fully homomorphic encryption
Abstract Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and
has many applications. However, its practical implementation faces massive computation …
has many applications. However, its practical implementation faces massive computation …
Accelerating finite-field and torus fhe via compute-enabled (s) ram
Fully Homomorphic Encryption (FHE) allows outsourced computation on clients' encrypted
data while preserving data privacy. FHE's high computational intensity incurs high overhead …
data while preserving data privacy. FHE's high computational intensity incurs high overhead …
Accelerator for computing on encrypted data
Fully homomorphic encryption enables computation on encrypted data, and hence it has a
great potential in privacy-preserving outsourcing of computations. In this paper, we present a …
great potential in privacy-preserving outsourcing of computations. In this paper, we present a …
Homomorphic Encryption Library, Framework, Toolkit and Accelerator: A Review
Homomorphic encryption ensures secure computation on encrypted data without the need
for decryption beforehand. It enables the secure offloading of computations to untrusted …
for decryption beforehand. It enables the secure offloading of computations to untrusted …
Accelerating polynomial modular multiplication with crossbar-based compute-in-memory
Lattice-based cryptographic algorithms built on ring learning with error theory are gaining
importance due to their potential for providing post-quantum security. However, these …
importance due to their potential for providing post-quantum security. However, these …
Slap: simpler, improved private stream aggregation from ring learning with errors
J Takeshita, R Karl, T Gong, T Jung - Journal of Cryptology, 2023 - Springer
Abstract Private Stream Aggregation (PSA) protocols perform secure aggregation of time-
series data without leaking information about users' inputs to the aggregator. Previous work …
series data without leaking information about users' inputs to the aggregator. Previous work …
Ppimce: An in-memory computing fabric for privacy preserving computing
Privacy has rapidly become a major concern/design consideration. Homomorphic
Encryption (HE) and Garbled Circuits (GC) are privacy-preserving techniques that support …
Encryption (HE) and Garbled Circuits (GC) are privacy-preserving techniques that support …
TERSE: tiny encryptions and really speedy execution for post-quantum private stream aggregation
The massive scale and performance demands of privacy-preserving data aggregation make
integration of security and privacy difficult. Traditional tools in private computing are not well …
integration of security and privacy difficult. Traditional tools in private computing are not well …
Gps: Integration of graphene, palisade, and sgx for large-scale aggregations of distributed data
J Takeshita, C McKechney, J Pajak… - Cryptology ePrint …, 2021 - eprint.iacr.org
Secure computing methods such as fully homomorphic encryption and hardware solutions
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …
such as Intel Software Guard Extension (SGX) have been applied to provide security for user …
Provably secure contact tracing with conditional private set intersection
The novel coronavirus COVID-19 spreads easily through personal contact, requiring the use
of contact tracing to track the spread of the disease. Many existing approaches either trust a …
of contact tracing to track the spread of the disease. Many existing approaches either trust a …