Fast proxy re-encryption for publish/subscribe systems

Y Polyakov, K Rohloff, G Sahu… - ACM Transactions on …, 2017 - dl.acm.org
We develop two IND-CPA-secure multihop unidirectional Proxy Re-Encryption (PRE)
schemes by applying the Ring-LWE (RLWE) key switching approach from the homomorphic …

A scalable implementation of fully homomorphic encryption built on NTRU

K Rohloff, DB Cousins - … Conference on Financial Cryptography and Data …, 2014 - Springer
In this paper we report on our work to design, implement and evaluate a Fully Homomorphic
Encryption (FHE) scheme. Our FHE scheme is an NTRU-like cryptosystem, with additional …

Scalable, practical voip teleconferencing with end-to-end homomorphic encryption

K Rohloff, DB Cousins… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We present an approach to scalable, secure voice over IP (VoIP) teleconferencing on
commodity mobile devices and data networks with end-to-end homomorphic encryption. We …

Privacy-preserving data exfiltration monitoring using homomorphic encryption

K Rohloff - 2015 IEEE 2nd International Conference on Cyber …, 2015 - ieeexplore.ieee.org
Monitoring and encryption are essential to secure today's computer networks. Monitoring
network traffic data can be especially useful to protect against data exfiltration by detecting …

Towards practical homomorphic encryption and efficient implementation

GR Sahu - 2020 - digitalcommons.njit.edu
Cloud computing has gained significant traction over the past few years and its application
continues to soar as evident from its rapid adoption in various industries. One of the major …