Noah's Ark: Efficient Threshold-FHE Using Noise Flooding

M Dahl, D Demmler, S El Kazdadi, A Meyre… - Proceedings of the 11th …, 2023 - dl.acm.org
We outline a secure and efficient methodology to do threshold distributed decryption for
LWE based Fully Homomorphic Encryption schemes. Due to the smaller parameters used in …

Pelta-shielding multiparty-FHE against malicious adversaries

S Chatel, C Mouchet, AU Sahin, A Pyrgelis… - Proceedings of the …, 2023 - dl.acm.org
Multiparty fully homomorphic encryption (MFHE) schemes enable multiple parties to
efficiently compute functions on their sensitive data while retaining confidentiality. However …

Threshold raccoon: Practical threshold signatures from standard lattice assumptions

R Del Pino, S Katsumata, M Maller… - … Conference on the …, 2024 - Springer
Threshold signatures improve both availability and security of digital signatures by splitting
the signing key into N shares handed out to different parties. Later on, any subset of at least …

Two-round threshold signature from algebraic one-more learning with errors

T Espitau, S Katsumata, K Takemure - Annual International Cryptology …, 2024 - Springer
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …

[PDF][PDF] Multiparty homomorphic encryption: From theory to practice

CV Mouchet - 2023 - infoscience.epfl.ch
Multiparty homomorphic encryption (MHE) enables a group of parties to encrypt data in a
way that (i) enables the evaluation of functions directly over its ciphertexts and (ii) enforces a …

Combining homomorphic encryption and differential privacy in federated learning

AG Sébert, M Checri, O Stan, R Sirdey… - 2023 20th Annual …, 2023 - ieeexplore.ieee.org
Recent works have investigated the relevance and practicality of using techniques such as
Differential Privacy (DP) or Homomorphic Encryption (HE) to strengthen training data privacy …

Round-Optimal, Fully Secure Distributed Key Generation

J Katz - Annual International Cryptology Conference, 2024 - Springer
Protocols for distributed (threshold) key generation (DKG) in the discrete-logarithm setting
have received a tremendous amount of attention in the past few years. Several synchronous …

Simulation-Secure Threshold PKE from LWE with Polynomial Modulus

D Micciancio, A Suhl - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In LWE based cryptosystems, using small (polynomially large) ciphertext modulus improves
both efficiency and security. In threshold encryption, one often needs" simulation security" …

Threshold Fully Homomorphic Encryption Over the Torus

Y Sugizaki, H Tsuchida, T Hayashi, K Nuida… - … on Research in …, 2023 - Springer
Fully homomorphic encryption (FHE) enables arithmetic operations to be performed over
plaintext by operations on undecrypted ciphertext. The Chillotti-Gama-Georgieva …

全同态加密技术的研究现状及发展路线综述

戴怡然, 张江, 向斌武, 邓燚 - 电子与信息学报, 2024 - jeit.ac.cn
随着物联网, 云计算, 人工智能的应用与普及, 数据安全与隐私保护成为人们关注的焦点.
全同态加密, 作为隐私安全问题的有效解决办法, 允许对加密数据执行任意同态计算 …