Filters








36 Hits in 5.3 sec

A Comparison of the Homomorphic Encryption Schemes FV and YASHE [chapter]

Tancrède Lepoint, Michael Naehrig
2014 Lecture Notes in Computer Science  
We conduct a theoretical and practical comparison of two Ring-LWE-based, scale-invariant, leveled homomorphic encryption schemes -Fan and Vercauteren's adaptation of BGV and the YASHE scheme proposed by  ...  resulting schemes are called FV and YASHE, respectively.  ...  We thank the Africacrypt 2013 referees for their interesting reviews, and Frederik Vercauteren for insightful comments on batching.  ... 
doi:10.1007/978-3-319-06734-6_20 fatcat:emiit62dcbdsrnc46bc2wgk6wm

Exploring the Application of Homomorphic Encryption to a Cross Domain Solution

Cody Tinker, Kevin Millar, Alan Kaminsky, Michael Kurdziel, Marcin Lukowiak, Stanislaw Radziszowski
2019 MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)  
The reason for choosing YASHE over the FV scheme is based primarily off of the comparison results of Lepoint et al. [7] .  ...  YASHE The Yet Another Somewhat Homomorphic Encryption (YASHE) scheme is a leveled fully homomorphic encryption scheme developed by Bos et. al [6] based on the Stehlé and Steinfeld [24] and López-Alt  ...  The trade-off in both systems compared to the original is that the metadata must now be encrypted and transferred under YASHE  ... 
doi:10.1109/milcom47813.2019.9021015 dblp:conf/milcom/TinkerMKKLR19 fatcat:bl7lqxfxhbbk7p565eoawahbpu

PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes

Cyrielle Feron, Vianney Lapotre, Loïc Lagadec
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
This paper introduces PAnTHErS, a Prototyping and Analysis Tool for Homomorphic Encryption Schemes that alleviates the need for implementation to estimate the performances of any new HE scheme.  ...  ., Lapotre, V. and Lagadec, L. PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes.  ...  He created a Somewhat Homomorphic Encryption (SHE) scheme and introduced a bootstrapping phase that permits to refresh the noise in ciphertexts.  ... 
doi:10.5220/0006464703590366 dblp:conf/secrypt/FeronLL17 fatcat:d2yhhfsb6za3lps6cgkv24k6fa

Ring-LWE: Applications to Cryptography and Their Efficient Realization [chapter]

Sujoy Sinha Roy, Angshuman Karmakar, Ingrid Verbauwhede
2016 Lecture Notes in Computer Science  
The persistent progress of quantum computing with algorithms of Shor and Proos and Zalka has put our present RSA and ECC based public key cryptosystems at peril.  ...  The learning with errors problem introduced by Oded Regev offers a way to design secure cryptography schemes in the post-quantum world.  ...  An analysis on the choice of parameter set for a required multiplicative depth for two homomorphic encryption schemes FV [10] and YASHE [5] is provided by Tancrde and Naehrig in [17] .  ... 
doi:10.1007/978-3-319-49445-6_18 fatcat:7y34eqtumvhexap5rusvgjzppy

Tile-based modular architecture for accelerating homomorphic function evaluation on FPGA

Mustafa Khairallah, Maged Ghoneima
2016 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS)  
The architecture has been evaluated by computing a block of each of the AES and SIMON-64/128 on the LTV and YASHE schemes.  ...  In this paper, a new architecture for accelerating homomorphic function evaluation on FPGA is proposed. A parallel cached NTT algorithm with an overall time complexity O( √ N log √ N ) is presented.  ...  A more recent study [13] has expanded the comparison to all the 4 ring-based schemes: BGV, LTV, YASHE and FV.  ... 
doi:10.1109/mwscas.2016.7870149 dblp:conf/mwscas/KhairallahG16 fatcat:tbmbcwl7ifamnpl73ferfnuxjy

Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? [chapter]

Ana Costache, Nigel P. Smart
2016 Lecture Notes in Computer Science  
The scale invariant versions are often called the YASHE and FV schemes. As an additional optimization, we also investigate the ffect of modulus reduction on the scale-invariant schemes.  ...  Ring Based SHE Schemes We refer to our four schemes as BGV, FV, NTRU and YASHE.  ...  Acknowledgements This work has been supported in part by an ERC Advanced Grant ERC-2010-AdG-267188-CRIPTO and by the European Union's H2020 Programme under grant agree-  ... 
doi:10.1007/978-3-319-29485-8_19 fatcat:wb5qw5obhzdyxezkruuihz6kay

Hardware/Software Co-Design Of An Accelerator For Fv Homomorphic Encryption Scheme Using Karatsuba Algorithm

Vincent Migliore, Vianney Lapotre, Maria Méndez Real, Arnaud Tisserand, Caroline Fontaine, Guy Gogniat
2016 Zenodo  
Following this trend, this work investigates the benefits of using Karatsuba algorithm instead of FFT for the Fan-Vercauteren (FV) Homomorphic Encryption scheme.  ...  Somewhat Homomorphic Encryption (SHE) schemes allow to carry out operations on data in the cipher domain.  ...  ACKNOWLEDGMENT Authors would like to thank the reviewers for their precious time and constructive comments which helped us to further improve the quality of the manuscript.  ... 
doi:10.5281/zenodo.439057 fatcat:rvvbtr6qyvgozdxfjbkoch62x4

Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case

L. Jiang, L. Chen, T. Giannetsos, K. Liang, J. Han
2020 Zenodo  
In this paper, based on somewhat homomorphic encryption (SHE) scheme addressed by Junfeng Fan and Frederik Vercauteren (FV), we provide the first instance of a new efficient SHE scheme for homomorphic  ...  evaluation over Single Instruction Multiple Data (SIMD).We also implement a new set of efficient SIMD homomorphic comparison and division schemes.  ...  In the scheme [41] , authors compare SHE FV scheme [22] with Yet Another Somewhat Homomorphic Encryption (YASHE) scheme [42] .  ... 
doi:10.5281/zenodo.3979078 fatcat:3tf2rbcgsffxtj5w26ibco2nv4

Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case

Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han
2019 IEEE Internet of Things Journal  
In this paper, based on somewhat homomorphic encryption (SHE) scheme addressed by Junfeng Fan and Frederik Vercauteren (FV), we provide the first instance of a new efficient SHE scheme for homomorphic  ...  We also implement a new set of efficient SIMD homomorphic comparison and division schemes.  ...  In the scheme [41] , authors compare SHE FV scheme [22] with Yet Another Somewhat Homomorphic Encryption (YASHE) scheme [42] .  ... 
doi:10.1109/jiot.2019.2936532 fatcat:y5v7372o5ned3ljkoxnc3yg2pe

High-Precision Arithmetic in Homomorphic Encryption [chapter]

Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
2018 Lecture Notes in Computer Science  
We combine a trick of Hoffstein and Silverman, where the modulus t is replaced by a polynomial x − b, with the Fan-Vercauteren homomorphic encryption scheme.  ...  In most RLWE-based homomorphic encryption schemes the native plaintext elements are polynomials in a rting Zt[x]/(x n +1), where n is a power of 2, and t an integer modulus.  ...  Comparison to FV In this section we present a performance comparison of the new scheme with the FV scheme.  ... 
doi:10.1007/978-3-319-76953-0_7 fatcat:w43jak5mabhg5jzdobj6nbxd4i

Homomorphic noise growth in practice: comparing BGV and FV [article]

Anamaria Costache, Kim Laine, Rachel Player
2019 IACR Cryptology ePrint Archive  
The purpose of this paper is to test the accuracy of worstcase heuristic bounds on the noise growth in ring-based homomorphic encryption schemes.  ...  As an additional contribution, we update the comparison between the two schemes presented by Costache and Smart (CT-RSA, 2016).  ...  Previous comparisons of homomorphic encryption schemes include [18, 28, 30] .  ... 
dblp:journals/iacr/CostacheLP19 fatcat:oszev7xranasvcpvqb6q2b36ji

FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data

Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
2019 Zenodo  
We design a custom co-processor for the computationally expensive operations of the well-known Fan-Vercauteren (FV) homomorphic encryption scheme on the FPGA, and make the Arm processor a server for executing  ...  At 200 MHz FPGA-clock, our implementation achieves over 13x speedup with respect to a highly optimized software implementation of the FV homomorphic encryption scheme on an Intel i5 processor running at  ...  The YASHE scheme is computationally three to four times faster than the FV scheme and has roughly half memory requirement.  ... 
doi:10.5281/zenodo.2641901 fatcat:z33uymx5uje4pbt3rv5bcxraqa

FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data

Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
2019 2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)  
We design a custom co-processor for the computationally expensive operations of the well-known Fan-Vercauteren (FV) homomorphic encryption scheme on the FPGA, and make the Arm processor a server for executing  ...  At 200 MHz FPGAclock, our implementation achieves over 13x speedup with respect to a highly optimized software implementation of the FV homomorphic encryption scheme on an Intel i5 processor running at  ...  The YASHE scheme is computationally three to four times faster than the FV scheme and has roughly half memory requirement.  ... 
doi:10.1109/hpca.2019.00052 dblp:conf/hpca/RoyT0VV19 fatcat:7dnbixoetnekxmlav5esxaiiuu

Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [article]

Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
2020 arXiv   pre-print
In this paper, we show how to accelerate the performance of running CNNs on encrypted data with GPUs. We evaluated two CNNs to classify homomorphically the MNIST and CIFAR-10 datasets.  ...  FHE, with its widely-known feature of computing on encrypted data, empowers a wide range of privacy-concerned applications. This comes at high cost as it requires enormous computing power.  ...  Acknowledgment This work is supported by A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Programmtic  ... 
arXiv:1811.00778v3 fatcat:igxqmm3uivasjbvhtm52rd2uf4

Computing-in-Memory for Performance and Energy Efficient Homomorphic Encryption [article]

Dayane Reis, Jonathan Takeshita, Taeho Jung, Michael Niemier, Xiaobo Sharon Hu
2020 arXiv   pre-print
This paper introduces CiM-HE, a Computing-in-memory (CiM) architecture that can support operations for the B/FV scheme, a somewhat homomorphic encryption scheme for general computation.  ...  Homomorphic encryption (HE) allows direct computations on encrypted data. Despite numerous research efforts, the practicality of HE schemes remains to be demonstrated.  ...  Likewise, [5] , [30] can perform the essential operations of the B/FV SHE scheme, i.e., homomorphic multiplications and additions.  ... 
arXiv:2005.03002v2 fatcat:uhl6rezsxbatroccka6y53rdqm
« Previous Showing results 1 — 15 out of 36 results