One Server for the Price of Two: Simple and Fast {Single-Server} Private Information Retrieval

A Henzinger, MM Hong, H Corrigan-Gibbs… - 32nd USENIX Security …, 2023 - usenix.org
We present SimplePIR, the fastest single-server private information retrieval scheme known
to date. SimplePIR's security holds under the learning-with-errors assumption. To answer a …

Verifiable fully homomorphic encryption

A Viand, C Knabenhans, A Hithnawi - arXiv preprint arXiv:2301.07041, 2023 - arxiv.org
Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect
data in use by allowing computation over encrypted data. However, the same malleability …

A survey on implementations of homomorphic encryption schemes

TVT Doan, ML Messai, G Gavin, J Darmont - The Journal of …, 2023 - Springer
With the increased need for data confidentiality in various applications of our daily life,
homomorphic encryption (HE) has emerged as a promising cryptographic topic. HE enables …

Fully homomorphic encryption beyond IND-CCA1 security: Integrity through verifiability

M Manulis, J Nguyen - Annual International Conference on the Theory and …, 2024 - Springer
We focus on the problem of constructing fully homomorphic encryption (FHE) schemes that
achieve some meaningful notion of adaptive chosen-ciphertext security beyond CCA1 …

Federated Learning is Better with Non-Homomorphic Encryption

K Burlachenko, A Alrowithi, FA Albalawi… - Proceedings of the 4th …, 2023 - dl.acm.org
Traditional AI methodologies necessitate centralized data collection, which becomes
impractical when facing problems with network communication, data privacy, or storage …

Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption

E Chielle, O Mazonka, H Gamil… - ACM Transactions on …, 2024 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables computation directly on encrypted data. This
property is desirable for outsourced computation of sensitive data as it relies solely on the …

Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption

B Libert - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We show that the smallness of message spaces can be used as a checksum allowing to
hedge against CCA1 attacks in additively homomorphic encryption schemes. We first show …

vrFHE- Securing FHE from Reaction-based Key Recovery Attacks

B Chaturvedi, A Chakraborty, A Chatterjee… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) promises to secure our data on the untrusted
cloud, by allowing arbitrary computations on encrypted data. However, the malleability and …

Useable Fully Homomorphic Encryption

A Viand - 2023 - research-collection.ethz.ch
Fully Homomorphic Encryption (FHE) enables arbitrary computations to be performed over
encrypted data, eliminating the need to decrypt the data and expose it to potential risk while …

Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption

JJ Sustronk - 2022 - essay.utwente.nl
Companies continuously monitor their (internal) networks for incoming cyber attacks and
use that 'cyber threat intelligence data'(CTI) to improve their security policies. This …