Optimized stream-cipher-based transciphering by means of functional-bootstrapping
AA Bendoukha, PE Clet, A Boudguiga… - IFIP Annual Conference …, 2023 - Springer
Fully homomorphic encryption suffers from a large expansion in the size of encrypted data,
which makes FHE impractical for low-bandwidth networks. Fortunately, transciphering …
which makes FHE impractical for low-bandwidth networks. Fortunately, transciphering …
ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations
The promising field of homomorphic encryption enables functions to be evaluated on
encrypted data and produce results that mimic the same computations done on plaintexts. It …
encrypted data and produce results that mimic the same computations done on plaintexts. It …
Revisiting Oblivious Top- Selection with Applications to Secure -NN Classification
An oblivious Top-$ k $ algorithm selects the $ k $ smallest elements from $ d $ elements
while ensuring the sequence of operations and memory accesses do not depend on the …
while ensuring the sequence of operations and memory accesses do not depend on the …
Designs for practical SHE schemes based on Ring-LWR
Abstract The Learning with Errors problem (LWE) and its variants are among the most
popular assumptions underlying lattice-based cryptography. The Learning with Rounding …
popular assumptions underlying lattice-based cryptography. The Learning with Rounding …
cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications
Large polynomial multiplication is one of the computational bottlenecks in fully homomorphic
encryption implementations. Usually, these multiplications are implemented using the …
encryption implementations. Usually, these multiplications are implemented using the …
PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption
C Gouert, NG Tsoutsos - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Homomorphic encryption is a powerful technology that solves key privacy concerns in cloud
computing by enabling computation on encrypted data. However, it has not seen …
computing by enabling computation on encrypted data. However, it has not seen …
[PDF][PDF] ModHE: Modular Homomorphic Encryption Using Module Lattices
The promising field of homomorphic encryption enables functions to be evaluated on
encrypted data and produce results for the same computations done on plaintexts. It …
encrypted data and produce results for the same computations done on plaintexts. It …