Openfhe: Open-source fully homomorphic encryption library
A Al Badawi, J Bates, F Bergamaschi… - proceedings of the 10th …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables
performing computations over encrypted data without having access to the secret key. We …
performing computations over encrypted data without having access to the secret key. We …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption
R Geva, A Gusev, Y Polyakov, L Liram… - Proceedings of the …, 2023 - National Acad Sciences
Real-world healthcare data sharing is instrumental in constructing broader-based and larger
clinical datasets that may improve clinical decision-making research and outcomes …
clinical datasets that may improve clinical decision-making research and outcomes …
Area-efficient number theoretic transform architecture for homomorphic encryption
P Duong-Ngoc, S Kwon, D Yoo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Homomorphic encryption (HE) has emerged as an ideal cryptographic technology for
meaningful computations on encrypted data. Not only does HE secure private information …
meaningful computations on encrypted data. Not only does HE secure private information …
Unlocking the potential of fully homomorphic encryption
S Gorantala, R Springer, B Gipson - Communications of the ACM, 2023 - dl.acm.org
Unlocking the Potential of Fully Homomorphic Encryption Page 1 MODERN LIFE IS awash with
sensitive, private data. From credit cards and banking to conversations, photos, and medical …
sensitive, private data. From credit cards and banking to conversations, photos, and medical …
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings
A Di Giusto, C Marcolla - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The Brakerski-Gentry-Vaikuntanathan (BGV) scheme is a Fully Homomorphic
Encryption (FHE) cryptosystem based on the Ring Learning With Error (RLWE) problem …
Encryption (FHE) cryptosystem based on the Ring Learning With Error (RLWE) problem …
Pipelined key switching accelerator architecture for CKKS-based fully homomorphic encryption
The increasing ubiquity of big data and cloud-based computing has led to increased
concerns regarding the privacy and security of user data. In response, fully homomorphic …
concerns regarding the privacy and security of user data. In response, fully homomorphic …
HEKWS: Privacy-Preserving convolutional neural network-based keyword spotting with a ciphertext packing technique
DL Elworth, S Kim - 2022 IEEE 24th International Workshop on …, 2022 - ieeexplore.ieee.org
Keyword spotting (KWS) is a key technology in smart devices. However, privacy issues in
these devices have been constantly raised. To solve this problem, this paper applies …
these devices have been constantly raised. To solve this problem, this paper applies …
H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption
With the increasing adoption of connected and autonomous vehicles, platooning services
have emerged as a promising solution to enhance road traffic efficiency. However, the …
have emerged as a promising solution to enhance road traffic efficiency. However, the …
CKKS-Based Homomorphic Encryption Architecture using Parallel NTT Multiplier
This paper presents a high-throughput CKKS-based encryption architecture for
homomorphic encryption. By de-ploying a parallel number theoretic transform (NTT) …
homomorphic encryption. By de-ploying a parallel number theoretic transform (NTT) …