A brief survey on encrypted control: From the first to the second generation and beyond

N Schlüter, P Binfet, MS Darup - Annual Reviews in Control, 2023 - Elsevier
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

Bts: An accelerator for bootstrappable fully homomorphic encryption

S Kim, J Kim, MJ Kim, W Jung, J Kim, M Rhu… - Proceedings of the 49th …, 2022 - dl.acm.org
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by
providing computation on encrypted data (ciphertexts). HE is based on noisy encryption …

Ark: Fully homomorphic encryption accelerator with runtime data generation and inter-operation key reuse

J Kim, G Lee, S Kim, G Sohn, M Rhu… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
Homomorphic Encryption (HE) is one of the most promising post-quantum cryptographic
schemes that enable privacy-preserving computation on servers. However, noise …

Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys

JP Bossuat, C Mouchet, J Troncoso-Pastoriza… - … Conference on the …, 2021 - Springer
We present a bootstrapping procedure for the full-RNS variant of the approximate
homomorphic-encryption scheme of Cheon et al., CKKS (Asiacrypt 17, SAC 18). Compared …

Salsa: Attacking lattice cryptography with transformers

E Wenger, M Chen, F Charton… - Advances in Neural …, 2022 - proceedings.neurips.cc
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale
quantum computers. Consequently," quantum resistant" cryptosystems are in high demand …

Efficient homomorphic comparison methods with optimal complexity

JH Cheon, D Kim, D Kim - … 2020: 26th International Conference on the …, 2020 - Springer
Abstract Comparison of two numbers is one of the most frequently used operations, but it
has been a challenging task to efficiently compute the comparison function in homomorphic …

SHARP: A short-word hierarchical accelerator for robust and practical fully homomorphic encryption

J Kim, S Kim, J Choi, J Park, D Kim… - Proceedings of the 50th …, 2023 - dl.acm.org
Fully homomorphic encryption (FHE) is an emerging cryptographic technology that
guarantees the privacy of sensitive user data by enabling direct computations on encrypted …

Security guidelines for implementing homomorphic encryption

JP Bossuat, R Cammarota, I Chillotti… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows
performing arbitrary operations on encrypted data. Since the conception of the idea in …

Bootstrapping in FHEW-like cryptosystems

D Micciancio, Y Polyakov - Proceedings of the 9th on Workshop on …, 2021 - dl.acm.org
FHEW and TFHE are fully homomorphic encryption (FHE) cryptosystems that can evaluate
arbitrary Boolean circuits on encrypted data by bootstrapping after each gate evaluation …