A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
TFHE: fast fully homomorphic encryption over the torus
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …
revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW …
Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds
I Chillotti, N Gama, M Georgieva… - Advances in Cryptology …, 2016 - Springer
In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring
variants. We notice that the internal product of GSW can be replaced by a simpler external …
variants. We notice that the internal product of GSW can be replaced by a simpler external …
Fast homomorphic evaluation of deep discretized neural networks
F Bourse, M Minelli, M Minihold, P Paillier - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
The rise of machine learning as a service multiplies scenarios where one faces a privacy
dilemma: either sensitive user data must be revealed to the entity that evaluates the …
dilemma: either sensitive user data must be revealed to the entity that evaluates the …
Efficient Fully Homomorphic Encryption from (Standard)
Z Brakerski, V Vaikuntanathan - SIAM Journal on computing, 2014 - SIAM
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of
a message, m, into an encryption of any (efficient) function of that message, f(m), without …
a message, m, into an encryption of any (efficient) function of that message, f(m), without …
Noninteractive zero knowledge for NP from (plain) learning with errors
C Peikert, S Shiehian - Annual International Cryptology Conference, 2019 - Springer
We finally close the long-standing problem of constructing a noninteractive zero-knowledge
(NIZK) proof system for any NP language with security based on the plain Learning With …
(NIZK) proof system for any NP language with security based on the plain Learning With …
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …
Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE
I Chillotti, N Gama, M Georgieva… - … Conference on the Theory …, 2017 - Springer
In this paper, we present several methods to improve the evaluation of homomorphic
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …