GraSS: Graph-based Similarity Search on Encrypted Query

D Kim, Y Nam, W Wang, H Gong, I Bhati… - Cryptology ePrint …, 2024 - eprint.iacr.org
Similarity search, ie, retrieving vectors in a database that are similar to a query, is the
backbone of many applications. Especially, graph-based methods show state-of-the-art …

Leveraging ASIC AI Chips for Homomorphic Encryption

J Tong, T Huang, L de Castro, A Itagi, J Dang… - arxiv preprint arxiv …, 2025 - arxiv.org
Cloud-based services are making the outsourcing of sensitive client data increasingly
common. Although homomorphic encryption (HE) offers strong privacy guarantee, it requires …

Efficient Key-Switching for Word-Type FHE and GPU Acceleration

S **, Z Gu, G Li, D Chen, CK Koç… - Cryptology ePrint …, 2024 - eprint.iacr.org
Speed efficiency, memory optimization, and quantum resistance are essential for
safeguarding the performance and security of cloud computing environments. Fully …