Filters








15 Hits in 5.7 sec

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2020 Journal of Mathematical Cryptology  
AbstractThis paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN.  ...  First and foremost, it becomes an integral tool for the recent standardization initiatives of homomorphic schemes and common APIs.  ...  This method can speed-up the Chimera framework by replacing some of the underlying KS methods. Figure 1 : 1 Figure 1: Bridges between Ring-LWE homomorphic schemes.  ... 
doi:10.1515/jmc-2019-0026 fatcat:4w5cmb4o2zgsrm6dti457ft2jq

Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning [article]

Christina Boura, Nicolas Gama, Mariya Georgieva
2018 IACR Cryptology ePrint Archive  
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN.  ...  First and foremost, it becomes an integral tool for the recent standardization initiatives of homomorphic schemes and common APIs.  ...  This paper proposes such a practical hybrid solution based on efficient switching algorithms for three different Ring-LWE schemes, where each scheme is best suited for certain types of operations: 1) TFHE  ... 
dblp:journals/iacr/BouraGG18 fatcat:wx42tm66r5aqpcjgkusb5pbmbu

Glyph: Fast and Accurately Training Deep Neural Networks on Encrypted Data [article]

Qian Lou and Bo Feng and Geoffrey C. Fox and Lei Jiang
2020 arXiv   pre-print
In this paper, we propose, Glyph, a FHE-based scheme to fast and accurately train DNNs on encrypted data by switching between TFHE (Fast Fully Homomorphic Encryption over the Torus) and BGV cryptosystems  ...  To train a DNN on encrypted data in a completely non-interactive way, a recent work proposes a fully homomorphic encryption (FHE)-based technique implementing all activations in the neural network by Brakerski-Gentry-Vaikuntanathan  ...  Based on Ring-LWE (Learning With Errors), multiple FHE cryptosystems [8, 6] , e.g., TFHE [8] , BFV [10] , BGV [6] , HEAAN [11] , are developed.  ... 
arXiv:1911.07101v3 fatcat:ynxlpeuu7reiplsstlnbteppjq

PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption [article]

Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
2020 IACR Cryptology ePrint Archive  
Homomorphic encryption (HE) is considered as one of the most important primitives for privacy-preserving applications.  ...  The first one is a private decision tree evaluation whose communication cost is about two orders of magnitude smaller than the previous HE-based approaches.  ...  Overview PEGASUS works on a set of (R)LWE-based schemes parameterized by different (R)LWE dimensions and arguments.  ... 
dblp:journals/iacr/LuHHMQ20 fatcat:7tinugzpsfhrtforsffymdza3q

An Efficient FHE Radix-2 Addition Algorithm in BGV Scheme

Zongsheng Hou, Neng Zhang, Leibo Liu
2021 Journal of Physics, Conference Series  
Fully homomorphic encryption (FHE) is a novel encryption method that can perform operations on encrypted data.  ...  The performance of applications based on FHE is still low due to the high computational complexity of operations on the ciphertext.  ...  The LWE-based homomorphic encryption scheme has the problem of ciphertext expansion during the multiplication process.  ... 
doi:10.1088/1742-6596/1993/1/012030 fatcat:fw2it5fwhzbabphkk7aaee2rpy

Preface for the Number-Theoretic Methods in Cryptology conferences

Antoine Joux, Jacek Pomykała
2020 Journal of Mathematical Cryptology  
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes Christina Boura, Nicolas Gama, Mariya Georgieva and Dimitar Jetchev Curves 2 -Chair: Tanja Lange 1.  ...  ECC Against Fault Attacks: The Ring Extension Method Revisited Marc Joye 2.  ... 
doi:10.1515/jmc-2019-0111 fatcat:p4v77xl3afh4xbszk3b5bgwkka

Ultra-Fast Homomorphic Encryption Models enable Secure Outsourcing of Genotype Imputation [article]

Miran Kim, Arif Ozgun Harmanci, Jean-Philippe Bossuat, Sergiu Carpov, Jung Hee Cheon, Ilaria Chilotti, Wonhee Cho, David Froelicher, Nicolas Gama, Mariya Georgieva, Seungwan Hong, Jean-Pierre Hubaux (+9 others)
2020 bioRxiv   pre-print
To address this problem, we developed the first fully secure genotype imputation by utilizing ultra-fast homomorphic encryption (HE) techniques that can evaluate millions of imputation models in seconds  ...  In HE-based methods, the genotype data is end-to-end encrypted, i.e., encrypted in transit, at rest, and, most importantly, in analysis, and can be decrypted only by the data owner.  ...  IC, SC, MG, and NG trained and implemented the Chimera-TFHE pipeline and contributed the results to the manuscript. DK, WC, SH, YSN, and JHC trained and implemented the SNU-CKKS pipeline.  ... 
doi:10.1101/2020.07.02.183459 fatcat:kb3go4hdjvd2pcq4fl3jox62qm

t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme

Joon Soo Yoo, Ji Won Yoon, Junggab Son
2021 Security and Communication Networks  
Conversely, our approach is more fundamental; we present t-BMPNet which is a neural network over fully homomorphic encryption scheme that is built upon primitive gates and fundamental bitwise homomorphic  ...  Homomorphic encryption (HE) is notable for enabling computation on encrypted data as well as guaranteeing high-level security based on the hardness of the lattice problem.  ...  encryption technology).  ... 
doi:10.1155/2021/7621260 fatcat:ifn5sorl2rgxjlsum6cjjoivfe

Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation

Miran Kim, Arif Ozgun Harmanci, Jean-Philippe Bossuat, Sergiu Carpov, Jung Hee Cheon, Ilaria Chillotti, Wonhee Cho, David Froelicher, Nicolas Gama, Mariya Georgieva, Seungwan Hong, Jean-Pierre Hubaux (+9 others)
2021 Cell Systems  
Here, we developed secure genotype imputation using efficient homomorphic encryption (HE) techniques.  ...  HE-based methods have time and memory requirements that are comparable or lower than those for the non-secure methods.  ...  Our scheme achieves 130 bits of security, according to the LWE estimator (Albrecht et al., 2015) .  ... 
doi:10.1016/j.cels.2021.07.010 pmid:34464590 fatcat:c2pqyvmpxrddplkly35lciddcy

Homomorphic Sortition – Secret Leader Election for Blockchain [article]

Luciano Freitas, Andrei Tonkikh, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Nicolas Quero, Adda-Akram Bendoukha, Petr Kuznetsov
2022 arXiv   pre-print
We describe Homomorphic Sortition, an SLS protocol based on Threshold Fully Homomorphic Encryption (ThFHE).  ...  An interesting question is whether we can use of a combination of several Ring-LWE-based homomorphic encryption schemes as proposed in Chimera [10] .  ...  [6] , our SLS implementation that we call Homomorphic Sortition is based on Threshold Fully Homomorphic Encryption (ThFHE). Unlike [6] , however, our protocol is purely asynchronous.  ... 
arXiv:2206.11519v1 fatcat:ppi4kbcmpvajzdws64l75aluya

Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits

Craig Gentry, Shai Halevi
2011 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science  
We describe a new approach for constructing fully homomorphic encryption (FHE) schemes.  ...  Our new approach constructs FHE as a hybrid of a SWHE and a multiplicatively homomorphic encryption (MHE) scheme, such as Elgamal.  ...  Acknowledgments This material is based on research sponsored by DARPA under agreement number FA8750-11-C-0096. The U.S.  ... 
doi:10.1109/focs.2011.94 dblp:conf/focs/GentryH11 fatcat:yhyw4xnwqrhn7c2yqbfqegggae

Two quantum Ising algorithms for the shortest-vector problem

David Joseph, Adam Callison, Cong Ling, Florian Mintert
2021 Physical Review A  
LWE has even served as the basis for the first fully homomorphic encryption scheme [15] . Other notable lattice-based cryptosystems include NTRU [16] and Goldreich-Goldwasser-Halevi (GGH) [17] .  ...  LBC has spawned the celebrated learning with errors (LWE) problem [14] , later adapted for efficiency (at the risk of as yet unknown security trade-offs) into Ring-LWE, in which computations are performed  ... 
doi:10.1103/physreva.103.032433 fatcat:snckx27nyvbc5h2t7h7to5wkxu

Two quantum Ising algorithms for the Shortest Vector Problem: one for now and one for later [article]

David Joseph, Adam Callison, Cong Ling, Florian Mintert
2021 arXiv   pre-print
LWE has even served as the basis for the first fully homomorphic encryption scheme (FHE) [22] . Other notable latticebased cryptosystems include NTRU [26] and GGH [23] .  ...  LBC has spawned the celebrated learning with errors (LWE) problem [39] , later adapted for efficiency (at the risk of as-yet unknown security tradeoffs) into Ring-LWE whereby computations are performed  ...  A model requiring full connectivity can be mapped into D-Wave's Chimera topology incurring a quadratic cost in the number of qubits required.  ... 
arXiv:2006.14057v7 fatcat:xmom26i6lzbsppweywvgrwf2yy

A suite of quantum algorithms for the shortestvector problem

David Joseph, Cong Ling, Academic Centres Of Excellence In Cyber Security Research
2022
A forerunner among PQC is lattice-based cryptography, whose security relies upon the hardness of a number of closely related mathematical problems, one of which is known as the shortest vector problem  ...  The scheme is based upon the NTRU assumption, which is that factoring polynomials in a truncated polynomial ring, into polynomials with small coefficients, is difficult.  ...  homomorphic encryption GGH Goldreich, Goldwasser and Halevi HKZ Hermite Korkine Zolotarev HNF Hermite normal form ISO International Standards Organization LBC Lattice-based cryptography LLL Lenstra Lenstra  ... 
doi:10.25560/96595 fatcat:xzice5biffcjhcaqjgj3uulrsi

Continuous-time quantum computing

Adam Callison, Florian Mintert, UK Research And Innovation, Engineering And Physical Sciences Research Council
2021
After introducing and explaining the CTQC framework in detail, in this thesis I will, through a combination of numerical, analytical, and experimental work, examine the performance of various forms of  ...  LWE has also been used as the basis for a fully homomorphic encryption scheme (FHE) (Gentry, 2009) .  ...  Other important LBC schemes include the N th-dgree Truncated-polynomial Ring Units (NTRU) scheme (Jeffrey et al., 1998) and the Goldreich-Goldwasser-Halevi (GGH) scheme (Goldreich et al., 1997) .  ... 
doi:10.25560/91503 fatcat:ikuvn5jlgrenrkoelcwgjzvbvm