From accuracy to approximation: A survey on approximate homomorphic encryption and its applications

W Liu, L You, Y Shao, X Shen, G Hu, J Shi… - Computer Science …, 2025 - Elsevier
Due to the increasing popularity of application scenarios such as cloud computing, and the
growing concern of users about the security and privacy of their data, information security …

High-speed modular multiplier for lattice-based cryptosystems

W Tan, BM Case, A Wang, S Gao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Thanks to the inherent post-quantum resistant properties, lattice-based cryptography has
gained increasing attention in various cryptographic applications recently. To facilitate the …

An ultra-highly parallel polynomial multiplier for the bootstrapping algorithm in a fully homomorphic encryption scheme

W Tan, BM Case, G Hu, S Gao, Y Lao - Journal of Signal Processing …, 2021 - Springer
Fully homomorphic encryption (FHE) is a post-quantum secure cryptographic technology
that enables privacy-preserving computing on an untrusted platform without divulging any …

Privacy-Preserving Discretized Spiking Neural Networks

P Li, T Gao, H Huang, J Cheng, S Gao, Z Zeng… - arXiv preprint arXiv …, 2023 - arxiv.org
The rapid development of artificial intelligence has brought considerable convenience, yet
also introduces significant security risks. One of the research hotspots is to balance data …

Overflow-Detectable Floating-Point Fully Homomorphic Encryption

S Lee, DJ Shin - IEEE Access, 2024 - ieeexplore.ieee.org
A floating-point fully homomorphic encryption (FPFHE) is proposed, which is based on torus
fully homomorphic encryption equipped with programmable bootstrapping. Specifically …

Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption

KH Lee, YB Jeon, JW Yoon - 2024 IEEE 9th European …, 2024 - ieeexplore.ieee.org
Recent speech-based services such as voice assistants and cloud computing services have
brought security concerns, since those services constantly send user's speech data to the …

Microservices architectural based secure and failure aware task assignment schemes in fog‐cloud assisted Internet of things

C Wu, A Lakhan, TM Gronali - International Journal of …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) paradigm has applications in many domains and is
growing these days progressively. The applications are e‐business, e‐healthcare, and e …

Efficient Privacy-Preserving Convolutional Spiking Neural Networks with FHE

P Li, H Huang, T Gao, J Guo, J Duan - arXiv preprint arXiv:2309.09025, 2023 - arxiv.org
With the rapid development of AI technology, we have witnessed numerous innovations and
conveniences. However, along with these advancements come privacy threats and risks …

Quantum Fast Implementation of Functional Bootstrapping and Private Information Retrieval

G Ma, H Li - arXiv preprint arXiv:2409.20182, 2024 - arxiv.org
Classical privacy-preserving computation techniques safeguard sensitive data in cloud
computing, but often suffer from low computational efficiency. In this paper, we show that …

Privacy Preserving Discretized Spiking Neural Network with TFHE

P Li, T Gao, H Huang, J Cheng, S Gao… - 2023 International …, 2023 - ieeexplore.ieee.org
Artificial intelligence not only offers significant convenience but also raises privacy and
security concerns, which pose challenges for Spiking Neural Networks (SNNs). Fully …