Search Results - Computing on Encrypted Data

Refine Results
  1. 1

    Quantum computing on encrypted data by Fisher, K. A. G., Broadbent, A., Shalm, L. K., Yan, Z., Lavoie, J., Prevedel, R., Jennewein, T., Resch, K. J.

    ISSN: 2041-1723, 2041-1723
    Published: London Nature Publishing Group UK 01.01.2014
    Published in Nature communications (01.01.2014)
    “…The ability to perform computations on encrypted data is a powerful tool for protecting privacy…”
    Get full text
    Journal Article
  2. 2

    Continuous-variable quantum computing on encrypted data by Marshall, Kevin, Jacobsen, Christian S., Schäfermeier, Clemens, Gehring, Tobias, Weedbrook, Christian, Andersen, Ulrik L.

    ISSN: 2041-1723, 2041-1723
    Published: London Nature Publishing Group UK 14.12.2016
    Published in Nature communications (14.12.2016)
    “…The ability to perform computations on encrypted data is a powerful tool for protecting…”
    Get full text
    Journal Article
  3. 3

    Topical Collection on Computing on Encrypted Data by Pointcheval, David, Smart, Nigel Paul

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.04.2023
    Published in Journal of cryptology (01.04.2023)
    Get full text
    Journal Article
  4. 4

    Juliet: A Configurable Processor for Computing on Encrypted Data by Gouert, Charles, Mouris, Dimitris, Tsoutsos, Nektarios Georgios

    ISSN: 0018-9340, 1557-9956
    Published: IEEE 01.09.2024
    Published in IEEE transactions on computers (01.09.2024)
    “… In this work, we introduce a new design for a fully homomorphic processor, dubbed Juliet, to enable faster operations on encrypted data using the state-of-the-art TFHE and cuFHE libraries…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Medha: Microcoded Hardware Accelerator for computing on Encrypted Data by Mert, Ahmet Can, Aikata, Kwon, Sunmin, Shin, Youngsam, Yoo, Donghoon, Lee, Yongwoo, Sinha Roy, Sujoy

    ISSN: 2569-2925, 2569-2925
    Published: Ruhr-Universität Bochum 29.11.2022
    “…Homomorphic encryption enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud…”
    Get full text
    Journal Article
  7. 7

    Modes of Operation Suitable for Computing on Encrypted Data by Dragos Rotaru, Nigel P. Smart, Martijn Stam

    ISSN: 2519-173X
    Published: Ruhr-Universität Bochum 01.09.2017
    Published in IACR Transactions on Symmetric Cryptology (01.09.2017)
    “… In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field…”
    Get full text
    Journal Article
  8. 8

    Modes of Operation Suitable for Computing on Encrypted Data by Rotaru, Dragos, Smart, Nigel P., Stam, Martijn

    ISSN: 2519-173X, 2519-173X
    Published: 19.09.2017
    Published in IACR Transactions on Symmetric Cryptology (19.09.2017)
    “… In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field…”
    Get full text
    Journal Article
  9. 9

    UMPHE: A Library for Effective Computing On Encrypted Data by Philipp Borisovich Burtyka

    ISSN: 2074-7128, 2074-7136
    Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.03.2016
    “… and techniques for data movement between the slots of the ciphertext…”
    Get full text
    Journal Article
  10. 10

    Parameter Optimization and Larger Precision for (T)FHE by Bergerat, Loris, Boudi, Anas, Bourgerie, Quentin, Chillotti, Ilaria, Ligier, Damien, Orfila, Jean-Baptiste, Tap, Samuel

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2023
    Published in Journal of cryptology (01.07.2023)
    “…In theory, fully homomorphic encryption schemes allow users to compute any operation over encrypted data…”
    Get full text
    Journal Article
  11. 11

    An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption by Mouchet, Christian, Bertrand, Elliott, Hubaux, Jean-Pierre

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.04.2023
    Published in Journal of cryptology (01.04.2023)
    “…We propose and implement a multiparty homomorphic encryption (MHE) scheme with a t -out-of- N -threshold access-structure that is efficient and does not…”
    Get full text
    Journal Article
  12. 12

    BLEACH: Cleaning Errors in Discrete Computations Over CKKS by Drucker, Nir, Moshkowich, Guy, Pelleg, Tomer, Shaul, Hayim

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.01.2024
    Published in Journal of cryptology (01.01.2024)
    “…Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computations over encrypted real numbers…”
    Get full text
    Journal Article
  13. 13

    Rinocchio: SNARKs for Ring Arithmetic by Ganesh, Chaya, Nitulescu, Anca, Soria-Vazquez, Eduardo

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.10.2023
    Published in Journal of cryptology (01.10.2023)
    “…Succinct non-interactive arguments of knowledge (SNARKs) enable non-interactive efficient verification of NP computations and admit short proofs. However, all…”
    Get full text
    Journal Article
  14. 14

    (Inner-Product) Functional Encryption with Updatable Ciphertexts by Cini, Valerio, Ramacher, Sebastian, Slamanig, Daniel, Striecks, Christoph, Tairi, Erkan

    ISSN: 0933-2790, 1432-1378, 1432-1378
    Published: New York Springer US 01.01.2024
    Published in Journal of cryptology (01.01.2024)
    “…We propose a novel variant of functional encryption which supports ciphertext updates, dubbed ciphertext-updatable functional encryption. Such a feature…”
    Get full text
    Journal Article
  15. 15

    Bootstrapping for BGV and BFV Revisited by Geelen, Robin, Vercauteren, Frederik

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.04.2023
    Published in Journal of cryptology (01.04.2023)
    “…We unify the state-of-the-art bootstrapping algorithms for BGV and BFV in a single framework and show that both schemes can be bootstrapped with identical…”
    Get full text
    Journal Article
  16. 16

    Unbounded Predicate Inner Product Functional Encryption from Pairings by Dowerah, Uddipana, Dutta, Subhranil, Mitrokotsa, Aikaterini, Mukherjee, Sayantan, Pal, Tapas

    ISSN: 0933-2790, 1432-1378, 1432-1378
    Published: New York Springer US 01.07.2023
    Published in Journal of cryptology (01.07.2023)
    “…) which additionally hides attributes associated to ciphertexts. In a P-IPFE, a message x is encrypted under an attribute w and a secret key is generated for a pair ( y , v…”
    Get full text
    Journal Article
  17. 17

    Decentralized Multi-authority ABE for NC1 from BDH by Datta, Pratish, Komargodski, Ilan, Waters, Brent

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.04.2023
    Published in Journal of cryptology (01.04.2023)
    “…Decentralized multi-authority attribute-based encryption ( MA - ABE ) is a strengthening of standard ciphertext-policy attribute-based encryption so that there…”
    Get full text
    Journal Article
  18. 18

    I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups by Bouvier, Cyril, Castagnos, Guilhem, Imbert, Laurent, Laguillaumie, Fabien

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2023
    Published in Journal of cryptology (01.07.2023)
    “…We introduce BICYCL an open-source C++ library that implements arithmetic in the ideal class groups of imaginary quadratic fields, together with a set of…”
    Get full text
    Journal Article
  19. 19

    MPClan: Protocol Suite for Privacy-Conscious Computations by Koti, Nishat, Patil, Shravani, Patra, Arpita, Suresh, Ajith

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2023
    Published in Journal of cryptology (01.07.2023)
    “…The growing volumes of data being collected and its analysis to provide better services are creating worries about digital privacy…”
    Get full text
    Journal Article
  20. 20

    Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires by Nieminen, Raine, Schneider, Thomas

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.10.2023
    Published in Journal of cryptology (01.10.2023)
    “…Garbled circuits are a fundamental cryptographic primitive that allows two or more parties to securely evaluate an arbitrary Boolean circuit without revealing…”
    Get full text
    Journal Article