A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
A survey on fully homomorphic encryption: An engineering perspective
It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …
HEAX: An architecture for computing on encrypted data
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …
confidentiality also have been increased significantly. Not only cloud providers are …
Tensorfhe: Achieving practical computation on encrypted data using gpgpu
S Fan, Z Wang, W Xu, R Hou, D Meng… - … Symposium on High …, 2023 - ieeexplore.ieee.org
In the cloud computing era, privacy protection is becoming pervasive in a broad range of
applications (eg, machine learning, data mining, etc). Fully Homomorphic Encryption (FHE) …
applications (eg, machine learning, data mining, etc). Fully Homomorphic Encryption (FHE) …
Privacy preservation for federated learning in health care
Artificial intelligence (AI) shows potential to improve health care by leveraging data to build
models that can inform clinical workflows. However, access to large quantities of diverse …
models that can inform clinical workflows. However, access to large quantities of diverse …
Poseidon: Practical homomorphic encryption accelerator
Y Yang, H Zhang, S Fan, H Lu… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
With the development of the important solution for privacy computing, the explosion of data
size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous …
size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous …
Multi-GPU design and performance evaluation of homomorphic encryption on GPU clusters
We present a multi-GPU design, implementation and performance evaluation of the Halevi-
Polyakov-Shoup (HPS) variant of the Fan-Vercauteren (FV) levelled Fully Homomorphic …
Polyakov-Shoup (HPS) variant of the Fan-Vercauteren (FV) levelled Fully Homomorphic …
Fpga-based hardware accelerator for leveled ring-lwe fully homomorphic encryption
Y Su, B Yang, C Yang, L Tian - IEEE Access, 2020 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and
has great potential in privacy-preserving cloud computing and securely outsource …
has great potential in privacy-preserving cloud computing and securely outsource …
Accelerating homomorphic evaluation on reconfigurable hardware
Homomorphic encryption allows computation on encrypted data and makes it possible to
securely outsource computational tasks to untrusted environments. However, all proposed …
securely outsource computational tasks to untrusted environments. However, all proposed …
Designing an FPGA-accelerated homomorphic encryption co-processor
In this paper we report on our advances designing and implementing an FPGA-based
computation accelerator as part of a Homomorphic Encryption Processing Unit (HEPU) co …
computation accelerator as part of a Homomorphic Encryption Processing Unit (HEPU) co …