A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
2020
Journal of Mathematical Cryptology
AbstractThis paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. ...
First and foremost, it becomes an integral tool for the recent standardization initiatives of homomorphic schemes and common APIs. ...
This method can speed-up the Chimera framework by replacing some of the underlying KS methods. Figure 1 : 1 Figure 1: Bridges between Ring-LWE homomorphic schemes. ...
doi:10.1515/jmc-2019-0026
fatcat:4w5cmb4o2zgsrm6dti457ft2jq
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning
[article]
2018
IACR Cryptology ePrint Archive
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. ...
First and foremost, it becomes an integral tool for the recent standardization initiatives of homomorphic schemes and common APIs. ...
This paper proposes such a practical hybrid solution based on efficient switching algorithms for three different Ring-LWE schemes, where each scheme is best suited for certain types of operations: 1) TFHE ...
dblp:journals/iacr/BouraGG18
fatcat:wx42tm66r5aqpcjgkusb5pbmbu
Glyph: Fast and Accurately Training Deep Neural Networks on Encrypted Data
[article]
2020
arXiv
pre-print
In this paper, we propose, Glyph, a FHE-based scheme to fast and accurately train DNNs on encrypted data by switching between TFHE (Fast Fully Homomorphic Encryption over the Torus) and BGV cryptosystems ...
To train a DNN on encrypted data in a completely non-interactive way, a recent work proposes a fully homomorphic encryption (FHE)-based technique implementing all activations in the neural network by Brakerski-Gentry-Vaikuntanathan ...
Based on Ring-LWE (Learning With Errors), multiple FHE cryptosystems [8, 6] , e.g., TFHE [8] , BFV [10] , BGV [6] , HEAAN [11] , are developed. ...
arXiv:1911.07101v3
fatcat:ynxlpeuu7reiplsstlnbteppjq
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
[article]
2020
IACR Cryptology ePrint Archive
Homomorphic encryption (HE) is considered as one of the most important primitives for privacy-preserving applications. ...
The first one is a private decision tree evaluation whose communication cost is about two orders of magnitude smaller than the previous HE-based approaches. ...
Overview PEGASUS works on a set of (R)LWE-based schemes parameterized by different (R)LWE dimensions and arguments. ...
dblp:journals/iacr/LuHHMQ20
fatcat:7tinugzpsfhrtforsffymdza3q
An Efficient FHE Radix-2 Addition Algorithm in BGV Scheme
2021
Journal of Physics, Conference Series
Fully homomorphic encryption (FHE) is a novel encryption method that can perform operations on encrypted data. ...
The performance of applications based on FHE is still low due to the high computational complexity of operations on the ciphertext. ...
The LWE-based homomorphic encryption scheme has the problem of ciphertext expansion during the multiplication process. ...
doi:10.1088/1742-6596/1993/1/012030
fatcat:fw2it5fwhzbabphkk7aaee2rpy
Preface for the Number-Theoretic Methods in Cryptology conferences
2020
Journal of Mathematical Cryptology
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Christina Boura, Nicolas Gama, Mariya Georgieva and Dimitar Jetchev
Curves 2 -Chair: Tanja Lange
1. ...
ECC Against Fault Attacks: The Ring Extension Method Revisited Marc Joye 2. ...
doi:10.1515/jmc-2019-0111
fatcat:p4v77xl3afh4xbszk3b5bgwkka
Ultra-Fast Homomorphic Encryption Models enable Secure Outsourcing of Genotype Imputation
[article]
2020
bioRxiv
pre-print
To address this problem, we developed the first fully secure genotype imputation by utilizing ultra-fast homomorphic encryption (HE) techniques that can evaluate millions of imputation models in seconds ...
In HE-based methods, the genotype data is end-to-end encrypted, i.e., encrypted in transit, at rest, and, most importantly, in analysis, and can be decrypted only by the data owner. ...
IC, SC, MG, and NG trained and implemented the Chimera-TFHE pipeline and contributed the results to the manuscript. DK, WC, SH, YSN, and JHC trained and implemented the SNU-CKKS pipeline. ...
doi:10.1101/2020.07.02.183459
fatcat:kb3go4hdjvd2pcq4fl3jox62qm
t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme
2021
Security and Communication Networks
Conversely, our approach is more fundamental; we present t-BMPNet which is a neural network over fully homomorphic encryption scheme that is built upon primitive gates and fundamental bitwise homomorphic ...
Homomorphic encryption (HE) is notable for enabling computation on encrypted data as well as guaranteeing high-level security based on the hardness of the lattice problem. ...
encryption technology). ...
doi:10.1155/2021/7621260
fatcat:ifn5sorl2rgxjlsum6cjjoivfe
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
2021
Cell Systems
Here, we developed secure genotype imputation using efficient homomorphic encryption (HE) techniques. ...
HE-based methods have time and memory requirements that are comparable or lower than those for the non-secure methods. ...
Our scheme achieves 130 bits of security, according to the LWE estimator (Albrecht et al., 2015) . ...
doi:10.1016/j.cels.2021.07.010
pmid:34464590
fatcat:c2pqyvmpxrddplkly35lciddcy
Homomorphic Sortition – Secret Leader Election for Blockchain
[article]
2022
arXiv
pre-print
We describe Homomorphic Sortition, an SLS protocol based on Threshold Fully Homomorphic Encryption (ThFHE). ...
An interesting question is whether we can use of a combination of several Ring-LWE-based homomorphic encryption schemes as proposed in Chimera [10] . ...
[6] , our SLS implementation that we call Homomorphic Sortition is based on Threshold Fully Homomorphic Encryption (ThFHE). Unlike [6] , however, our protocol is purely asynchronous. ...
arXiv:2206.11519v1
fatcat:ppi4kbcmpvajzdws64l75aluya
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
2011
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
We describe a new approach for constructing fully homomorphic encryption (FHE) schemes. ...
Our new approach constructs FHE as a hybrid of a SWHE and a multiplicatively homomorphic encryption (MHE) scheme, such as Elgamal. ...
Acknowledgments This material is based on research sponsored by DARPA under agreement number FA8750-11-C-0096. The U.S. ...
doi:10.1109/focs.2011.94
dblp:conf/focs/GentryH11
fatcat:yhyw4xnwqrhn7c2yqbfqegggae
Two quantum Ising algorithms for the shortest-vector problem
2021
Physical Review A
LWE has even served as the basis for the first fully homomorphic encryption scheme [15] . Other notable lattice-based cryptosystems include NTRU [16] and Goldreich-Goldwasser-Halevi (GGH) [17] . ...
LBC has spawned the celebrated learning with errors (LWE) problem [14] , later adapted for efficiency (at the risk of as yet unknown security trade-offs) into Ring-LWE, in which computations are performed ...
doi:10.1103/physreva.103.032433
fatcat:snckx27nyvbc5h2t7h7to5wkxu
Two quantum Ising algorithms for the Shortest Vector Problem: one for now and one for later
[article]
2021
arXiv
pre-print
LWE has even served as the basis for the first fully homomorphic encryption scheme (FHE) [22] . Other notable latticebased cryptosystems include NTRU [26] and GGH [23] . ...
LBC has spawned the celebrated learning with errors (LWE) problem [39] , later adapted for efficiency (at the risk of as-yet unknown security tradeoffs) into Ring-LWE whereby computations are performed ...
A model requiring full connectivity can be mapped into D-Wave's Chimera topology incurring a quadratic cost in the number of qubits required. ...
arXiv:2006.14057v7
fatcat:xmom26i6lzbsppweywvgrwf2yy
A suite of quantum algorithms for the shortestvector problem
2022
A forerunner among PQC is lattice-based cryptography, whose security relies upon the hardness of a number of closely related mathematical problems, one of which is known as the shortest vector problem ...
The scheme is based upon the NTRU assumption, which is that factoring polynomials in a truncated polynomial ring, into polynomials with small coefficients, is difficult. ...
homomorphic encryption GGH Goldreich, Goldwasser and Halevi HKZ Hermite Korkine Zolotarev HNF Hermite normal form ISO International Standards Organization LBC Lattice-based cryptography LLL Lenstra Lenstra ...
doi:10.25560/96595
fatcat:xzice5biffcjhcaqjgj3uulrsi
Continuous-time quantum computing
2021
After introducing and explaining the CTQC framework in detail, in this thesis I will, through a combination of numerical, analytical, and experimental work, examine the performance of various forms of ...
LWE has also been used as the basis for a fully homomorphic encryption scheme (FHE) (Gentry, 2009) . ...
Other important LBC schemes include the N th-dgree Truncated-polynomial Ring Units (NTRU) scheme (Jeffrey et al., 1998) and the Goldreich-Goldwasser-Halevi (GGH) scheme (Goldreich et al., 1997) . ...
doi:10.25560/91503
fatcat:ikuvn5jlgrenrkoelcwgjzvbvm