A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

HEAX: An architecture for computing on encrypted data

MS Riazi, K Laine, B Pelton, W Dai - Proceedings of the twenty-fifth …, 2020 - dl.acm.org
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …

FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data

SS Roy, F Turan, K Jarvinen… - … symposium on high …, 2019 - ieeexplore.ieee.org
Homomorphic encryption is a tool that enables computation on encrypted data and thus has
applications in privacy-preserving cloud computing. Though conceptually amazing …

Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT

N Zhang, B Yang, C Chen, S Yin, S Wei… - IACR Transactions on …, 2020 - tches.iacr.org
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …

Poseidon: Practical homomorphic encryption accelerator

Y Yang, H Zhang, S Fan, H Lu… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
With the development of the important solution for privacy computing, the explosion of data
size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous …

Area-efficient number theoretic transform architecture for homomorphic encryption

P Duong-Ngoc, S Kwon, D Yoo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Homomorphic encryption (HE) has emerged as an ideal cryptographic technology for
meaningful computations on encrypted data. Not only does HE secure private information …

Hardware architecture of a number theoretic transform for a bootstrappable RNS-based homomorphic encryption scheme

S Kim, K Lee, W Cho, Y Nam, JH Cheon… - 2020 IEEE 28th …, 2020 - ieeexplore.ieee.org
Homomorphic encryption (HE) is one of the most promising solutions to secure cloud
computing. The number theoretic transform (NTT) that is widely used for convolution …

Computing-in-memory for performance and energy-efficient homomorphic encryption

D Reis, J Takeshita, T Jung… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Homomorphic encryption (HE) allows direct computations on encrypted data. Despite
numerous research efforts, the practicality of HE schemes remains to be demonstrated. In …

INSPIRE: in-s torage p rivate i nformation re trieval via protocol and architecture co-design

J Lin, L Liang, Z Qu, I Ahmad, L Liu, F Tu… - Proceedings of the 49th …, 2022 - dl.acm.org
Private Information Retrieval (PIR) plays a vital role in secure, database-centric applications.
However, existing PIR protocols explore a massive working space containing hundreds of …

Fpga-based hardware accelerator for leveled ring-lwe fully homomorphic encryption

Y Su, B Yang, C Yang, L Tian - IEEE Access, 2020 - ieeexplore.ieee.org
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and
has great potential in privacy-preserving cloud computing and securely outsource …