Crypto Dark Matter on the Torus: Oblivious PRFs from Shallow PRFs and TFHE

MR Albrecht, A Davidson, A Deo… - … Conference on the Theory …, 2024 - Springer
Abstract Partially Oblivious Pseudorandom Functions (POPRFs) are 2-party protocols that
allow a client to learn pseudorandom function (PRF) evaluations on inputs of its choice from …

Noah's Ark: Efficient Threshold-FHE Using Noise Flooding

M Dahl, D Demmler, S El Kazdadi, A Meyre… - Proceedings of the 11th …, 2023 - dl.acm.org
We outline a secure and efficient methodology to do threshold distributed decryption for
LWE based Fully Homomorphic Encryption schemes. Due to the smaller parameters used in …

Attacks against the INDCPA-D security of exact FHE schemes

JH Cheon, H Choe, A Passelègue, D Stehlé… - Cryptology ePrint …, 2024 - eprint.iacr.org
A new security model for fully homomorphic encryption (FHE), called INDCPA-D security
and introduced by Li and Micciancio [Eurocrypt'21], strengthens INDCPA security by giving …

[PDF][PDF] Efficient and Secure k-NN Classification from Improved Data-Oblivious Programs and Homomorphic Encryption.

K Cong, R Geelen, J Kang, J Park - IACR Cryptol. ePrint Arch., 2023 - esat.kuleuven.be
The k-nearest neighbors classifier is a simple machine learning algorithm with applications
in image recognition, finance, medical diagnosis and so on. It involves a measurement …

FHEDA: efficient circuit synthesis with reduced bootstrapping for Torus FHE

A Singh, S Das, A Chakraborty… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) schemes are widely used cryptographic primitives for
performing arbitrary computations on encrypted data. However, FHE incorporates a …

Faster NTRU-based Bootstrapping in less than 4 ms

Z Li, X Lu, Z Wang, R Wang, Y Liu, Y Zheng… - IACR Transactions on …, 2024 - tches.iacr.org
Bootstrapping is a critical technique in constructing fully homomorphic encryption (FHE),
which serves to refresh the noise in FHE ciphertexts, enabling an arbitrary number of …

Homomorphic additive lightweight block cipher scheme for securing IoT applications

K Hariss, H Noura - Journal of Information Security and Applications, 2023 - Elsevier
Recent emerging systems and applications may be able to process encrypted data to
preserve user privacy. However, designing an efficient Homomorphic Encryption (HE) …

Morphling: A Throughput-Maximized TFHE-based Accelerator using Transform-domain Reuse

A Putra, JY Kim - 2024 IEEE International Symposium on …, 2024 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) has become an increasingly important aspect in
modern computing, particularly in preserving privacy in cloud computing by enabling …

Revisiting Oblivious Top- Selection with Applications to Secure -NN Classification

K Cong, R Geelen, J Kang, J Park - Cryptology ePrint Archive, 2023 - eprint.iacr.org
An oblivious Top-$ k $ algorithm selects the $ k $ smallest elements from $ d $ elements
while ensuring the sequence of operations and memory accesses do not depend on the …

APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption

L Ding, S Bian, P He, Y Xu, G Qu, J Zhang - arXiv preprint arXiv …, 2024 - arxiv.org
Fully Homomorphic Encryption (FHE) allows one to outsource computation over encrypted
data to untrusted servers without worrying about data breaching. Since FHE is known to be …