Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data

N Samardzic, A Feldmann, A Krastev… - Proceedings of the 49th …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …

Secure outsourced matrix computation and application to neural networks

X Jiang, M Kim, K Lauter, Y Song - … of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and
security issues in outsourcing computation on sensitive data to an untrusted computation …

Programmable bootstrapping enables efficient homomorphic inference of deep neural networks

I Chillotti, M Joye, P Paillier - … Symposium, CSCML 2021, Be'er Sheva …, 2021 - Springer
In many cases, machine learning and privacy are perceived to be at odds. Privacy concerns
are especially relevant when the involved data are sensitive. This paper deals with the …

SoK: Fully homomorphic encryption compilers

A Viand, P Jattke, A Hithnawi - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) allows a third party to perform arbitrary computations
on encrypted data, learning neither the inputs nor the computation results. Hence, it provides …

Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference

H Chen, W Dai, M Kim, Y Song - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted
data. Ló pez-Alt et al.(STOC 2012) proposed a generalized notion of HE, called Multi-Key …

Better bootstrapping for approximate homomorphic encryption

K Han, D Ki - Cryptographers' Track at the RSA Conference, 2020 - Springer
Abstract After Cheon et al.(Asiacrypt'17) proposed an approximate homomorphic encryption
scheme, HEAAN, for operations between encrypted real (or complex) numbers, the scheme …

Efficient homomorphic comparison methods with optimal complexity

JH Cheon, D Kim, D Kim - … 2020: 26th International Conference on the …, 2020 - Springer
Abstract Comparison of two numbers is one of the most frequently used operations, but it
has been a challenging task to efficiently compute the comparison function in homomorphic …

Revisiting homomorphic encryption schemes for finite fields

A Kim, Y Polyakov, V Zucca - … 2021: 27th International Conference on the …, 2021 - Springer
Abstract The Brakerski-Gentry-Vaikuntanathan (BGV) and Brakerski/Fan-Vercauteren (BFV)
schemes are the two main homomorphic encryption (HE) schemes to perform exact …

High-precision bootstrapping for approximate homomorphic encryption by error variance minimization

Y Lee, JW Lee, YS Kim, Y Kim, JS No… - … Conference on the Theory …, 2022 - Springer
Abstract The Cheon-Kim-Kim-Song (CKKS) scheme (Asiacrypt'17) is one of the most
promising homomorphic encryption (HE) schemes as it enables privacy-preserving …

Approximate homomorphic encryption with reduced approximation error

A Kim, A Papadimitriou, Y Polyakov - Cryptographers' Track at the RSA …, 2022 - Springer
Abstract The Cheon-Kim-Kim-Song (CKKS) homomorphic encryption scheme is currently
the most efficient method to perform approximate homomorphic computations over real and …