Virtual secure platform: A {Five-Stage} pipeline processor over {TFHE}

K Matsuoka, R Banno, N Matsumoto, T Sato… - 30th USENIX security …, 2021 - usenix.org
We present Virtual Secure Platform (VSP), the first comprehensive platform that implements
a multi-opcode general-purpose sequential processor over Fully Homomorphic Encryption …

Sorting of fully homomorphic encrypted cloud data: Can partitioning be effective?

A Chatterjee, I Sengupta - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
The challenge of maintaining confidentiality of stored data in cloud is of utmost importance to
realize the potential of cloud computing as an emerging storage solution service. Storing …

Translating algorithms to handle fully homomorphic encrypted data on the cloud

A Chatterjee, I Sengupta - IEEE Transactions on Cloud …, 2015 - ieeexplore.ieee.org
Cloud provides large shared resources where users (or foundations) can enjoy the facility of
storing data or executing applications. In spite of gaining convenience of large resources …

Designing a General-Purpose 8-bit (T) FHE Processor Abstraction

D Trama, PE Clet, A Boudguiga, R Sirdey… - Cryptology ePrint …, 2024 - eprint.iacr.org
Making the most of TFHE programmable bootstrap** to evaluate functions or operators
otherwise challenging to perform with only the native addition and multiplication of the …

Searching and sorting of fully homomorphic encrypted data on cloud

A Chatterjee, I Sengupta - Cryptology ePrint Archive, 2015 - eprint.iacr.org
The challenge of maintaining confidentiality of stored data in cloud is of utmost importance to
realize the potential of cloud computing. Storing data in encrypted form may solve the …

Targeting FPGA DSP slices for a large integer multiplier for integer based FHE

C Moore, N Hanley, J McAllister, M O'Neill… - … Cryptography and Data …, 2013 - Springer
Homomorphic encryption offers potential for secure cloud computing. However due to the
complexity of homomorphic encryption schemes, performance of implemented schemes to …

Towards practical homomorphic encryption in cloud computing

A Bouti, J Keller - 2015 IEEE Fourth Symposium on Network …, 2015 - ieeexplore.ieee.org
Secure computing in clouds faces many challenges related to data confidentiality and
integrity. Classical security models focus on securing data from outside attacks, eg from …

Secret shared random access machine

S Dolev, Y Li - Algorithmic Aspects of Cloud Computing: First …, 2016 - Springer
The computations over RAM are preferred over computations with circuits or Turing
machines. Secure and private RAM executions become more and more important in the …

Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions

M Harbach, S Fahl, M Brenner… - 2012 Tenth Annual …, 2012 - ieeexplore.ieee.org
The growing adoption of cloud technology in sensitive application domains, such as
medicine, gives rise to new problems in maintaining the privacy of the involved parties …

Privacy-preserving functional IP verification utilizing fully homomorphic encryption

C Konstantinou, A Keliris… - 2015 Design, Automation …, 2015 - ieeexplore.ieee.org
Intellectual Property (IP) verification is a crucial component of System-on-Chip (SoC) design
in the modern IC design business model. Given a globalized supply chain and an increasing …