Filters








245 Hits in 4.7 sec

CRT-based fully homomorphic encryption over the integers

Jung Hee Cheon, Jinsu Kim, Moon Sung Lee, Aaram Yun
2015 Information Sciences  
It was elegant work that precedes the recent development of fully homomorphic encryption schemes although there were found some security flaws, e.g., ring homomorphic schemes are broken by the knownplaintext  ...  In this paper, we revisit one of their proposals, in particular the third scheme which is based on the Chinese Remainder Theorem and is ring homomorphic.  ...  This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MEST) (No. 2012-0001243).  ... 
doi:10.1016/j.ins.2015.03.019 fatcat:4mv4ztkppvey3gqdw252rs3gaq

New packing method in somewhat homomorphic encryption and its applications

Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
2015 Security and Communication Networks  
In this paper, we consider the depth-specific description of somewhat homomorphic encryption(SHE) schemes over integers.  ...  In fact, it is common to have the set of ciphertexts in a fully homomorphic encryption(FHE) scheme as a ring with respect to the evaluation algorithms.  ...  In fact, all the known fully homomorphic encryption scheme are defined over a commutative ring and the core research issues in the construction of (fully or somewhat) homomorphic encryption schemes is  ... 
doi:10.1002/sec.1164 fatcat:3ssyoyflcrf2jeouvdgnoau3wm

Accelerating NTRU based homomorphic encryption using GPUs

Wei Dai, Yarkin Doroz, Berk Sunar
2014 2014 IEEE High Performance Extreme Computing Conference (HPEC)  
We further extend the library to support the homomorphic evaluation operations, i.e. addition, multiplication, and relinearization, in an NTRU based somewhat homomorphic encryption library.  ...  In this work we introduce a large polynomial arithmetic library optimized for Nvidia GPUs to support fully homomorphic encryption schemes.  ...  In this work, we build a discrete Fourier transform based library for Nvidia GTX GPUs from the ground up to support somewhat and fully homomorphic encryption schemes based on large polynomial multiplications  ... 
doi:10.1109/hpec.2014.7041001 dblp:conf/hpec/DaiDS14 fatcat:dbkpowdvijg2nbm6v4nl7fxjne

Privacy Preserving Outsourced Calculations With Symmetric Fully Homomorphic Encryption

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This paper addresses a new simple and non-bootstrappable Fully Homomorphic Encryption Scheme based on matrices as symmetric keys with access control.  ...  For privacy concerns the data is kept encrypted and made available to users on demand through cloud service provider over the internet.  ...  The Homomorphic Encryption (HE) schemes are categorized into the following types based on the number of operations allowed over the cipher:  Partially Homomorphic Encryption (PHE)  Somewhat Homomorphic  ... 
doi:10.35940/ijitee.j9457.0881019 fatcat:ktdpytumqfcy3gpjchqlk73tee

An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) — FPGA implementation using Simulink

David Bruce Cousins, Kurt Rohloff, Chris Peikert, Rick Schantz
2012 2012 IEEE Conference on High Performance Extreme Computing  
Accellerating the development of a practical Fully Homomorphic Encryption (FHE) scheme is the goal of the DARPA PROCEED program.  ...  Our baseline Homomorphic Encryption prototypes are developed directly in Matlab using the fixed point toolbox to perform the required integer arithmetic.  ...  A review of Fully and Somewhat Homomorphic Encryption Fully Homomorphic Encryption (FHE) holds the promise to securely run arbitrary computations over encrypted data on untrusted computation hosts [2]  ... 
doi:10.1109/hpec.2012.6408672 dblp:conf/hpec/CousinsRPS12 fatcat:ruzsgxfugfec5ke3hskuqfuiby

Analysis on Matrix GSW-FHE and Optimizing Bootstrapping

Xiufeng Zhao, Hefeng Mao, Shuai Liu, Weitao Song, Bo Zhang
2018 Security and Communication Networks  
Fully homomorphic encryption can be used to protect the privacy of cloud data and solve the trust problem of third party. In this paper, we analyse circular security of matrix GSW-FHE scheme.  ...  We also give an extended version of matrix GSW-FHE by defining deterministic asymmetric encryption algorithm and propose hybrid homomorphic plaintext slot-wise switching method, which significantly reduces  ...  Conflicts of Interest The authors declare that they have no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/6362010 fatcat:sndfgc5csvdavfsmfnfhsgeuya

Batch Fully Homomorphic Encryption over the Integers [chapter]

Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun
2013 Lecture Notes in Computer Science  
We extend the fully homomorphic encryption scheme over the integers of van Dijk et al.  ...  on a standard desktop computer; this is comparable to the timings presented by Gentry et al. at Crypto 2012 for their implementation of a Ring-LWE based fully homomorphic encryption scheme.  ...  The first, third, and fourth authors were  ... 
doi:10.1007/978-3-642-38348-9_20 fatcat:gwhzg2zjezghheitk3hkbucmvy

Input-Output History Feedback Controller for Encrypted Control with Leveled Fully Homomorphic Encryption [article]

Kaoru Teranishi, Tomonori Sadamoto, Kiminao Kogiso
2021 arXiv   pre-print
Although a fully homomorphic encryption scheme allows the evaluation of controller operations with encrypted data, an encrypted dynamic controller with the encryption scheme destabilizes a closed-loop  ...  An algorithm for efficient encrypted control computation is also proposed using single instruction/multiple data operations based on a batching technique.  ...  Fully homomorphic encryption enables to evaluate any arithmetic operations over a ciphertext space.  ... 
arXiv:2109.10718v1 fatcat:ba3dzdydu5d7rooyqk44fde7py

Secure Sharing of Partially Homomorphic Encrypted IoT Data

Hossein Shafagh, Anwar Hithnawi, Lukas Burkhalter, Pascal Fischli, Simon Duquennoy
2017 Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems - SenSys '17  
Our solution includes a suite of novel techniques that enable efficient partially homomorphic encryption, decryption, and sharing.  ...  More importantly, Pilatus features a novel encrypted data sharing scheme based on reencryption, with revocation capabilities and in situ key-update.  ...  ACKNOWLEDGMENTS The authors would like to express their gratitude to David Wu, Philip Levis, and Srdjan Capkun for the insightful discussions during the design phase of Pilatus.  ... 
doi:10.1145/3131672.3131697 dblp:conf/sensys/ShafaghHBFD17 fatcat:55mwjscqsbdulbl2yl3z5bh7oe

An FPGA co-processor implementation of Homomorphic Encryption

David Bruce Cousins, John Golusky, Kurt Rohloff, Daniel Sumorok
2014 2014 IEEE High Performance Extreme Computing Conference (HPEC)  
One of the goals of the DARPA PROCEED program has been accelerating the development of a practical Fully Homomorphic Encryption (FHE) scheme.  ...  Specifically, our contribution to the Proceed program has been the development of FPGA based hardware primitives to accelerate the computation on encrypted data using an FHE cryptosystem based on NTRU-like  ...  ACKNOWLEDGMENT We would like to acknowledge Christopher Peikert for all his numerous invaluable contributions to the theoretical and practical implementation aspects of this project.  ... 
doi:10.1109/hpec.2014.7040950 dblp:conf/hpec/CousinsGRS14 fatcat:le4sobby75c3pc5ufft266b3ay

Secure Face Matching Using Fully Homomorphic Encryption [article]

Vishnu Naresh Boddeti
2018 arXiv   pre-print
In this paper, we explore the practicality of using a fully homomorphic encryption based framework to secure a database of face templates.  ...  Face recognition technology has demonstrated tremendous progress over the past few years, primarily due to advances in representation learning.  ...  The development of fully homomorphic encryption by Gentry et al. [15] has led to the promise of statistical analysis over encrypted data.  ... 
arXiv:1805.00577v2 fatcat:cr5nqphj5jdllfz6shlqy5sfxi

Fast Arithmetic Hardware Library For RLWE-Based Homomorphic Encryption [article]

Rashmi Agrawal, Lake Bu, Alan Ehret, Michel A. Kinsy
2020 arXiv   pre-print
homomorphic encryption (SHE).  ...  We design and implement a hardware accelerator consisting of submodules like Residue Number System (RNS), Chinese Remainder Theorem (CRT), NTT-based polynomial multiplication, modulo inverse, modulo reduction  ...  The bootstrap operation is one of the key functions in achieving fully homomorphic encryption, but it remains very expensive to perform.  ... 
arXiv:2007.01648v1 fatcat:65av6glptzdeblsbtcg2nky2fq

Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware [chapter]

Yarkın Doröz, Erdinç Öztürk, Erkay Savaş, Berk Sunar
2015 Lecture Notes in Computer Science  
After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry.  ...  Here we introduce a custom hardware accelerator optimized for a class of reconfigurable logic to bring LTV based somewhat homomorphic encryption (SWHE) schemes one step closer to deployment in real-life  ...  Acknowledgments Funding for this research was in part provided by the US National Science Foundation CNS Award #1319130.  ... 
doi:10.1007/978-3-662-48324-4_10 fatcat:ncfmszgimfh4fe43d4k4f7w4pi

High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA

Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung
2018 Transactions on Cryptographic Hardware and Embedded Systems  
Homomorphic encryption (HE) offers great capabilities that can solve a wide range of privacy-preserving computing problems.  ...  This tool allows anyone to process encrypted data producing encrypted results that only the decryption key's owner can decrypt.  ...  Introduction Nearing 8 years since their introduction, Fully Homomorphic Encryption (FHE) schemes are set to revolutionize privacy-preserving computing by allowing one to perform arbitrary operations on  ... 
doi:10.13154/tches.v2018.i2.70-95 dblp:journals/tches/BadawiVMA18 fatcat:r3pazuxa5nesnlicqub7mmxmqy

Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search

Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede
2017 IEEE transactions on computers  
In 2009 Gentry [12] constructed the first fully homomorphic encryption (FHE) scheme by using ideal lattices.  ...  INTRODUCTION For many years the construction of a fully homomorphic encryption (FHE) scheme was an open problem in cryptography.  ...  APPENDIX Input: Polynomial a(x) ∈ Zq[x] of degree n − 1 and n-th primitive root ωn ∈ Zq of unity Output: Polynomial A(x) ∈ Zq[x] = NTT(a) begin 1 A ← BitReverse(a); /* Coefficients are stored in the memory  ... 
doi:10.1109/tc.2017.2686385 fatcat:mdx2gnojgjh4tp7s7mowlef2wy
« Previous Showing results 1 — 15 out of 245 results