A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …
recent years because of their potential to improve data availability and unlock new business …
Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …
F1: A fast and programmable accelerator for fully homomorphic encryption
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …
HEAX: An architecture for computing on encrypted data
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …
confidentiality also have been increased significantly. Not only cloud providers are …
Residue number systems: A new paradigm to datapath optimization for low-power and high-performance digital signal processing applications
CH Chang, AS Molahosseini… - IEEE circuits and …, 2015 - ieeexplore.ieee.org
Residue Number System (RNS) is a non-weighted number system which was proposed by
Garner back in 1959 to achieve fast implementation of addition, subtraction and …
Garner back in 1959 to achieve fast implementation of addition, subtraction and …
Poseidon: Practical homomorphic encryption accelerator
Y Yang, H Zhang, S Fan, H Lu… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
With the development of the important solution for privacy computing, the explosion of data
size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous …
size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous …
SHIELD: scalable homomorphic implementation of encrypted data-classifiers
Homomorphic encryption (HE) systems enable computations on encrypted data, without
decrypting and without knowledge of the secret key. In this work, we describe an optimized …
decrypting and without knowledge of the secret key. In this work, we describe an optimized …
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
C Gao, Q Cheng, X Li, S Xia - Cluster Computing, 2019 - Springer
Making new friends by measuring the proximity of people's profile is a crucial service in
mobile social networks. With the rapid development of cloud computing, outsourcing …
mobile social networks. With the rapid development of cloud computing, outsourcing …
Broncovote: Secure voting system using ethereum's blockchain
GG Dagher, PB Marella, M Milojkovic, J Mohler - 2018 - scholarworks.boisestate.edu
Voting is a fundamental part of democratic systems; it gives individuals in a community the
faculty to voice their opinion. In recent years, voter turnout has diminished while concerns …
faculty to voice their opinion. In recent years, voter turnout has diminished while concerns …