Efficient homomorphic comparison methods with optimal complexity

JH Cheon, D Kim, D Kim - … 2020: 26th International Conference on the …, 2020 - Springer
Abstract Comparison of two numbers is one of the most frequently used operations, but it
has been a challenging task to efficiently compute the comparison function in homomorphic …

Doren: toward efficient deep convolutional neural networks with fully homomorphic encryption

S Meftah, BHM Tan, CF Mun, KMM Aung… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) is a powerful cryptographic primitive to secure
outsourced computations against an untrusted third-party provider. With the growing …

Faster homomorphic comparison operations for BGV and BFV

I Iliashenko, V Zucca - Proceedings on Privacy Enhancing …, 2021 - hal.science
Fully homomorphic encryption (FHE) allows to compute any function on encrypted values.
However, in practice, there is no universal FHE scheme that is effi-cient in all possible use …

HEDA: multi-attribute unbounded aggregation over homomorphically encrypted database

X Ren, L Su, Z Gu, S Wang, F Li, Y ** for arbitrary plaintext modulus from CKKS
J Kim, J Seo, Y Song - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Bootstrap** is currently the only known method for constructing fully homomorphic
encryptions. In the BFV scheme specifically, bootstrap** aims to reduce the error of a …

Towards high performance homomorphic encryption for inference tasks on CPU: An MPI approach

S Meftah, BHM Tan, KMM Aung, L Yuxiao, L Jie… - Future Generation …, 2022 - Elsevier
Fully homomorphic encryption (FHE) is a powerful tool enabling secure outsourcing to
untrusted third-parties. As AI technologies mature and companies start offering AI-as-a …

Functional bootstrap** for packed ciphertexts via homomorphic LUT evaluation

D Lee, S Min, Y Song - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) enables the computation of an arbitrary
function over encrypted data without decrypting them. In particular, bootstrap** is a core …

Toward understanding efficient privacy-preserving homomorphic comparison

B Pulido-Gaytan, A Tchernykh, F Leprévost… - IEEE …, 2023 - ieeexplore.ieee.org
The security issues that arise in public cloud environments raise several concerns about
privacy-preserving. Conventional security practices successfully protect stored and …

Research review on the application of homomorphic encryption in database privacy protection

Y Ma, J Zhao, K Li, Y Cao, H Chen… - International Journal of …, 2021 - igi-global.com
With the advent and development of database applications such as big data and data
mining, how to ensure the availability of data without revealing sensitive information has …

Revisiting the hybrid attack on sparse and ternary secret LWE

Y Son, JH Cheon - Cryptology ePrint Archive, 2019 - eprint.iacr.org
In the practical use of the Learning With Error (LWE) based cryptosystems, it is quite
common to choose the secret to be extremely small: one popular choice is ternary ($\pm 1 …