A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Conceptual review on number theoretic transform and comprehensive review on its implementations

A Satriawan, I Syafalni, R Mareta, I Anshori… - IEEE …, 2023 - ieeexplore.ieee.org
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in develo** Post Quantum Cryptography (PQC) and Homomorphic …

Fast private set intersection from homomorphic encryption

H Chen, K Laine, P Rindal - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Private Set Intersection (PSI) is a cryptographic technique that allows two parties to compute
the intersection of their sets without revealing anything except the intersection. We use fully …

Simple encrypted arithmetic library-SEAL v2. 1

H Chen, K Laine, R Player - Financial Cryptography and Data Security: FC …, 2017 - Springer
Achieving fully homomorphic encryption was a longstanding open problem in cryptography
until it was resolved by Gentry in 2009. Soon after, several homomorphic encryption …

nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data

F Boemer, Y Lao, R Cammarota… - Proceedings of the 16th …, 2019 - dl.acm.org
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an
attractive remedy to increasing concerns about data privacy in deep learning (DL). However …

On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL

MR Albrecht - Annual International Conference on the Theory and …, 2017 - Springer
We present novel variants of the dual-lattice attack against LWE in the presence of an
unusually short secret. These variants are informed by recent progress in BKW-style …

Implementation and performance evaluation of RNS variants of the BFV homomorphic encryption scheme

A Al Badawi, Y Polyakov, KMM Aung… - … on Emerging Topics …, 2019 - ieeexplore.ieee.org
Homomorphic encryption is an emerging form of encryption that provides the ability to
compute on encrypted data without ever decrypting them. Potential applications include …

Decentralized action integrity for trigger-action IoT platforms

E Fernandes, A Rahmati, J Jung… - Proceedings 2018 Network …, 2018 - par.nsf.gov
Trigger-Action platforms are web-based systems that enable users to create automation
rules by stitching together online services representing digital and physical resources using …

Homomorphic lower digits removal and improved FHE bootstrap**

H Chen, K Han - Annual International Conference on the Theory and …, 2018 - Springer
Bootstrap** is a crucial operation in Gentry's breakthrough work on fully homomorphic
encryption (FHE), where a homomorphic encryption scheme evaluates its own decryption …

Manual for using homomorphic encryption for bioinformatics

N Dowlin, R Gilad-Bachrach, K Laine… - Proceedings of the …, 2017 - ieeexplore.ieee.org
Biological data science is an emerging field facing multiple challenges for hosting, sharing,
computing on, and interacting with large data sets. Privacy regulations and concerns about …