[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

Openfhe: Open-source fully homomorphic encryption library

A Al Badawi, J Bates, F Bergamaschi… - proceedings of the 10th …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) is a powerful cryptographic primitive that enables
performing computations over encrypted data without having access to the secret key. We …

Craterlake: a hardware accelerator for efficient unbounded computation on encrypted data

N Samardzic, A Feldmann, A Krastev… - Proceedings of the 49th …, 2022 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers
with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due …

F1: A fast and programmable accelerator for fully homomorphic encryption

N Samardzic, A Feldmann, A Krastev… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …

Conceptual review on number theoretic transform and comprehensive review on its implementations

A Satriawan, I Syafalni, R Mareta, I Anshori… - IEEE …, 2023 - ieeexplore.ieee.org
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic …

Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

Bts: An accelerator for bootstrappable fully homomorphic encryption

S Kim, J Kim, MJ Kim, W Jung, J Kim, M Rhu… - Proceedings of the 49th …, 2022 - dl.acm.org
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by
providing computation on encrypted data (ciphertexts). HE is based on noisy encryption …

Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs

W Jung, S Kim, JH Ahn, JH Cheon… - IACR Transactions on …, 2021 - tches.iacr.org
Fully Homomorphic encryption (FHE) has been gaining in popularity as an emerging means
of enabling an unlimited number of operations in an encrypted message without decryption …

HEAX: An architecture for computing on encrypted data

MS Riazi, K Laine, B Pelton, W Dai - Proceedings of the twenty-fifth …, 2020 - dl.acm.org
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …

Ark: Fully homomorphic encryption accelerator with runtime data generation and inter-operation key reuse

J Kim, G Lee, S Kim, G Sohn, M Rhu… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
Homomorphic Encryption (HE) is one of the most promising post-quantum cryptographic
schemes that enable privacy-preserving computation on servers. However, noise …