Attacks Against the IND-CPAD Security of Exact FHE Schemes

JH Cheon, H Choe, A Passelègue, D Stehlé… - Proceedings of the …, 2024 - dl.acm.org
A recent security model for fully homomorphic encryption (FHE), called IND-CPAD security
and introduced by Li and Micciancio [Eurocrypt'21], strengthens IND-CPA security by giving …

Crypto dark matter on the torus: Oblivious prfs from shallow prfs and tfhe

MR Albrecht, A Davidson, A Deo… - … Conference on the Theory …, 2024 - Springer
Abstract Partially Oblivious Pseudorandom Functions (POPRFs) are 2-party protocols that
allow a client to learn pseudorandom function (PRF) evaluations on inputs of its choice from …

Noah's Ark: Efficient Threshold-FHE Using Noise Flooding

M Dahl, D Demmler, S El Kazdadi, A Meyre… - Proceedings of the 11th …, 2023 - dl.acm.org
We outline a secure and efficient methodology to do threshold distributed decryption for
LWE based Fully Homomorphic Encryption schemes. Due to the smaller parameters used in …

Faster NTRU-based Bootstrap** in less than 4 ms

Z Li, X Lu, Z Wang, R Wang, Y Liu, Y Zheng… - IACR Transactions on …, 2024 - incs.ub.rub.de
Bootstrap** is a critical technique in constructing fully homomorphic encryption (FHE),
which serves to refresh the noise in FHE ciphertexts, enabling an arbitrary number of …

REED: Chiplet-based accelerator for fully homomorphic encryption

A Aikata, AC Mert, S Kwon, M Deryabin… - arxiv preprint arxiv …, 2023 - arxiv.org
Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and has
many applications. However, its practical implementation faces massive computation and …

Morphling: A throughput-maximized tfhe-based accelerator using transform-domain reuse

A Putra, JY Kim - 2024 IEEE International Symposium on …, 2024 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) has become an increasingly important aspect in
modern computing, particularly in preserving privacy in cloud computing by enabling …

Revisiting Oblivious Top- Selection with Applications to Secure -NN Classification

K Cong, R Geelen, J Kang, J Park - Cryptology ePrint Archive, 2023 - eprint.iacr.org
An oblivious Top-$ k $ algorithm selects the $ k $ smallest elements from $ d $ elements
while ensuring the sequence of operations and memory accesses do not depend on the …

Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption

A Aikata, SS Roy - International Conference on Cryptology in India, 2024 - Springer
Abstract Fully Homomorphic Encryption (FHE) is a promising privacy-enhancing technique
that enables secure and private data processing on untrusted servers, such as privacy …

Enabling Practical and Privacy-Preserving Image Processing

C Wang, S Yang, X Sun, J Dai, D Zhao - arxiv preprint arxiv:2409.03568, 2024 - arxiv.org
Fully Homomorphic Encryption (FHE) enables computations on encrypted data, preserving
confidentiality without the need for decryption. However, FHE is often hindered by significant …

Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption

C Hong - Security and Safety, 2025 - sands.edpsciences.org
Fully Homomorphic Encryption (FHE), known for its ability to process encrypted data without
decryption, is a promising technique for solving privacy concerns in the machine learning …