Optimized stream-cipher-based transciphering by means of functional-bootstrapping

AA Bendoukha, PE Clet, A Boudguiga… - IFIP Annual Conference …, 2023 - Springer
Fully homomorphic encryption suffers from a large expansion in the size of encrypted data,
which makes FHE impractical for low-bandwidth networks. Fortunately, transciphering …

ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations

A Mukherjee, A Aikata, AC Mert, Y Lee… - Cryptology ePrint …, 2023 - eprint.iacr.org
The promising field of homomorphic encryption enables functions to be evaluated on
encrypted data and produce results that mimic the same computations done on plaintexts. It …

Revisiting Oblivious Top- Selection with Applications to Secure -NN Classification

K Cong, R Geelen, J Kang, J Park - Cryptology ePrint Archive, 2023 - eprint.iacr.org
An oblivious Top-$ k $ algorithm selects the $ k $ smallest elements from $ d $ elements
while ensuring the sequence of operations and memory accesses do not depend on the …

Designs for practical SHE schemes based on Ring-LWR

M Bolboceanu, A Costache, E Hales, R Player… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract The Learning with Errors problem (LWE) and its variants are among the most
popular assumptions underlying lattice-based cryptography. The Learning with Rounding …

cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications

S Adhikary, WK Lee, A Karmakar, Y Lee… - Cryptology ePrint …, 2024 - eprint.iacr.org
Large polynomial multiplication is one of the computational bottlenecks in fully homomorphic
encryption implementations. Usually, these multiplications are implemented using the …

PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption

C Gouert, NG Tsoutsos - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Homomorphic encryption is a powerful technology that solves key privacy concerns in cloud
computing by enabling computation on encrypted data. However, it has not seen …

[PDF][PDF] ModHE: Modular Homomorphic Encryption Using Module Lattices

A Mukherjee, ACM Aikata Aikata, Y Lee, S Kwon… - tches.iacr.org
The promising field of homomorphic encryption enables functions to be evaluated on
encrypted data and produce results for the same computations done on plaintexts. It …