A metaverse: Taxonomy, components, applications, and open challenges
SM Park, YG Kim - IEEE access, 2022 - ieeexplore.ieee.org
Unlike previous studies on the Metaverse based on Second Life, the current Metaverse is
based on the social value of Generation Z that online and offline selves are not different …
based on the social value of Generation Z that online and offline selves are not different …
Silph: A framework for scalable and accurate generation of hybrid MPC protocols
Many applications in finance and healthcare need access to data from multiple
organizations. While these organizations can benefit from computing on their joint datasets …
organizations. While these organizations can benefit from computing on their joint datasets …
Bounded Verification for Finite-Field-Blasting: In a Compiler for Zero Knowledge Proofs
Abstract Zero Knowledge Proofs (ZKPs) are cryptographic protocols by which a prover
convinces a verifier of the truth of a statement without revealing any other information …
convinces a verifier of the truth of a statement without revealing any other information …
A tensor compiler with automatic data packing for simple and efficient fully homomorphic encryption
Fully Homomorphic Encryption (FHE) enables computing on encrypted data, letting clients
securely offload computation to untrusted servers. While enticing, FHE has two key …
securely offload computation to untrusted servers. While enticing, FHE has two key …
Coyote: A compiler for vectorizing encrypted arithmetic circuits
R Malik, K Sheth, M Kulkarni - Proceedings of the 28th ACM International …, 2023 - dl.acm.org
Fully Homomorphic Encryption (FHE) is a scheme that allows a computational circuit to
operate on encrypted data and produce a result that, when decrypted, yields the result of the …
operate on encrypted data and produce a result that, when decrypted, yields the result of the …
{ELASM}:{Error-Latency-Aware} Scale Management for Fully Homomorphic Encryption
Thanks to its fixed-point arithmetic and SIMD-like vectorization, among fully homomorphic
encryption (FHE) schemes that allow computation on encrypted data, RNS-CKKS is widely …
encryption (FHE) schemes that allow computation on encrypted data, RNS-CKKS is widely …
Eva improved: Compiler and extension library for ckks
Homomorphic encryption (HE), especially the CKKS scheme, can be extremely challenging
to use. The EVA language and compiler (Dathathri et al., PLDI 2020) was an attempt at …
to use. The EVA language and compiler (Dathathri et al., PLDI 2020) was an attempt at …
Rpu: The ring processing unit
Ring-Learning-with-Errors (RLWE) has emerged as the foundation of many important
techniques for improving security and privacy, including homomorphic encryption and post …
techniques for improving security and privacy, including homomorphic encryption and post …
{HECO}: Fully Homomorphic Encryption Compiler
In recent years, Fully Homomorphic Encryption (FHE) has undergone several breakthroughs
and advancements leading to a leap in performance. Today, performance is no longer a …
and advancements leading to a leap in performance. Today, performance is no longer a …
Secure synthesis of distributed cryptographic applications (technical report)
Developing secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …
cryptography must be used to achieve security goals. Following prior work, we advocate …