A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

GM Garrido, J Sedlmeir, Ö Uludağ, IS Alaoui… - Journal of Network and …, 2022 - Elsevier
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …

Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data

N Samardzic, A Feldmann, A Krastev… - Proceedings of the 49th …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …

F1: A fast and programmable accelerator for fully homomorphic encryption

N Samardzic, A Feldmann, A Krastev… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …

HEAX: An architecture for computing on encrypted data

MS Riazi, K Laine, B Pelton, W Dai - Proceedings of the twenty-fifth …, 2020 - dl.acm.org
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …

Residue number systems: A new paradigm to datapath optimization for low-power and high-performance digital signal processing applications

CH Chang, AS Molahosseini… - IEEE circuits and …, 2015 - ieeexplore.ieee.org
Residue Number System (RNS) is a non-weighted number system which was proposed by
Garner back in 1959 to achieve fast implementation of addition, subtraction and …

Poseidon: Practical homomorphic encryption accelerator

Y Yang, H Zhang, S Fan, H Lu… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
With the development of the important solution for privacy computing, the explosion of data
size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous …

SHIELD: scalable homomorphic implementation of encrypted data-classifiers

A Khedr, G Gulak… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Homomorphic encryption (HE) systems enable computations on encrypted data, without
decrypting and without knowledge of the secret key. In this work, we describe an optimized …

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network

C Gao, Q Cheng, X Li, S Xia - Cluster Computing, 2019 - Springer
Making new friends by measuring the proximity of people's profile is a crucial service in
mobile social networks. With the rapid development of cloud computing, outsourcing …

Broncovote: Secure voting system using ethereum's blockchain

GG Dagher, PB Marella, M Milojkovic, J Mohler - 2018 - scholarworks.boisestate.edu
Voting is a fundamental part of democratic systems; it gives individuals in a community the
faculty to voice their opinion. In recent years, voter turnout has diminished while concerns …