On the concrete hardness of learning with errors
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …
cryptographic constructions. This work collects and presents hardness results for concrete …
Privacy-preserving machine learning with fully homomorphic encryption for deep neural network
Fully homomorphic encryption (FHE) is a prospective tool for privacy-preserving machine
learning (PPML). Several PPML models have been proposed based on various FHE …
learning (PPML). Several PPML models have been proposed based on various FHE …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
A brief survey on encrypted control: From the first to the second generation and beyond
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
Bts: An accelerator for bootstrappable fully homomorphic encryption
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by
providing computation on encrypted data (ciphertexts). HE is based on noisy encryption …
providing computation on encrypted data (ciphertexts). HE is based on noisy encryption …
Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions
Recently, the standard ResNet-20 network was successfully implemented on the fully
homomorphic encryption scheme, residue number system variant Cheon-Kim-Kim-Song …
homomorphic encryption scheme, residue number system variant Cheon-Kim-Kim-Song …
Efficient bootstrap** for approximate homomorphic encryption with non-sparse keys
We present a bootstrap** procedure for the full-RNS variant of the approximate
homomorphic-encryption scheme of Cheon et al., CKKS (Asiacrypt 17, SAC 18). Compared …
homomorphic-encryption scheme of Cheon et al., CKKS (Asiacrypt 17, SAC 18). Compared …
Salsa: Attacking lattice cryptography with transformers
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale
quantum computers. Consequently," quantum resistant" cryptosystems are in high demand …
quantum computers. Consequently," quantum resistant" cryptosystems are in high demand …
Efficient FHEW bootstrap** with small evaluation keys, and applications to threshold homomorphic encryption
There are two competing approaches to bootstrap the FHEW fully homomorphic encryption
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …
scheme (Ducas and Micciancio, Eurocrypt 2015) and its variants: the original AP/FHEW …
Security guidelines for implementing homomorphic encryption
Abstract Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows
performing arbitrary operations on encrypted data. Since the conception of the idea in …
performing arbitrary operations on encrypted data. Since the conception of the idea in …