Article
Computer Science, Information Systems
Zengpeng Li, Chunguang Ma, Ding Wang
Summary: Fully Homomorphic Encryption (FHE) allows computing over encrypted data without decrypting ciphertexts, promising to preserve data privacy in big data computing environments. FHE schemes can be constructed using the Learning with Errors (LWE) assumption, with the challenge lying in achieving efficient multi-bit FHE encryption while resisting attacks that may capture cryptographic secret keys through side channel attacks. Based on Berkoff-Liu's work at TCC'14, a new structure of public key matrix with any number of LWE instances is proposed to achieve multi-bit FHE encryption with provable security.
IEEE TRANSACTIONS ON BIG DATA
(2021)
Article
Computer Science, Information Systems
Yu Huang, Kaigui Wu, Ming Chen
Summary: The paper introduces a fully dynamic multi-key fully homomorphic encryption scheme based on the learning with rounding (LWR) problem, which eliminates the time-consuming Gaussian sampling required in the LWE problem while maintaining almost the same security level.
Article
Computer Science, Theory & Methods
Yuling Chen, Sen Dong, Tao Li, Yilei Wang, Huiyu Zhou
Summary: Multi-key Fully Homomorphic Encryption (MFHE) schemes allow computation on encrypted data under different keys, with traditional LWE-based schemes having the undesirable property of fixed key numbers. A dynamic multi-key FHE scheme is the most versatile variant, not requiring information about participants before key generation. A proposed dynamic multi-key FHE scheme based on LWE assumption in public key setting allows extended ciphertexts and more efficient homomorphic computation without circular-security assumption.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Artificial Intelligence
J. S. Rauthan
Summary: Fully Homomorphic Encryption (FHE) is the ultimate goal of encrypted communications, providing advanced functionalities to overcome security and trust issues. FHE allows arbitrary functions to be computed via encrypted data, enhancing data processing security.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
(2022)
Article
Computer Science, Hardware & Architecture
Paul Lou, Amit Sahai, Varun Sivashankar
Summary: We investigate algebraic attacks on the Learning Parity with Noise (LPN) problem over large fields in parameter settings relevant to building indistinguishability obfuscation. Our aim was to obtain a subexponential algorithm using the Macaulay expansion and relinearization. Our findings suggest a relation between runtime and the rank of the Macaulay expansion.
Article
Computer Science, Hardware & Architecture
Fucai Luo, Haiyan Wang, Saif Al-Kuwari, Weihong Han
Summary: Fully Homomorphic Encryption (FHE) is a powerful encryption system that allows computation on encrypted data without decryption. Multi-key fully homomorphic encryption (MFHE) enables computation on ciphertexts encrypted under different keys. Most MFHE schemes require a Common Random/Reference String (CRS), but we propose the first MFHE without a CRS based on the Ring Learning With Errors (RLWE) problem.
COMPUTER STANDARDS & INTERFACES
(2023)
Article
Computer Science, Artificial Intelligence
Mohit Kumar, Weiping Zhang, Lukas Fischer, Bernhard Freudenthaler
Summary: This article explores privacy-preserving distributed deep learning using fully homomorphic encryption. It proposes a method for practical and scalable distributed deep learning by addressing the computational cost associated with fully homomorphic encrypted data. The method leverages fuzzy-based membership mappings for data representation learning to build a globally convergent and robust variational membership mappings and combines local deep models using fuzzy attributes to create an efficient global model.
IEEE TRANSACTIONS ON FUZZY SYSTEMS
(2023)
Article
Computer Science, Information Systems
Shahriar Ebrahimi, Siavash Bayat-Sarmadi
Summary: This study proposes a lightweight hardware/software co-design architecture for implementing LPN-based FE, which is resistant to simple side-channel analysis and significantly improves resource requirements compared to previous works.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar
Summary: Through evaluating the behavior of Vision implemented as a circuit in an FHE protocol, it is found that Vision does not perform better than AES in this setting. Furthermore, in an attempt to improve the bottleneck issue of evaluating Vision in FHE, a new cipher called Seljuk is proposed. However, Seljuk does not deliver the expected performance.
Article
Computer Science, Theory & Methods
Shengfeng Xu, Xiangxue Li, Haifeng Qian, Kefei Chen
Summary: The LPN problem is a candidate for post-quantum cryptography, with researchers proposing secure public key encryption schemes under the low-noise LPN assumption. A positive answer with squared-exponential DFR has been provided in the low-noise setting.
THEORETICAL COMPUTER SCIENCE
(2021)
Article
Computer Science, Information Systems
Sagarika Behera, Jhansi Rani Prathuri
Summary: This article introduces a fully homomorphic encryption scheme to protect data privacy and confidentiality in cloud computing environments, along with a new hardware architecture developed for this scheme. Through simulation and implementation validation, it is found that the proposed architecture has fast key generation, encryption, and decryption speeds, and consumes less hardware resources.
Article
Computer Science, Information Systems
Fucai Luo, Saif Al-Kuwari, Willy Susilo, Dung Hoang Duong
Summary: Homomorphic Proxy Re-Encryption (HPRE) is an extension of Proxy Re-Encryption (PRE) that combines the advantages of Homomorphic Encryption (HE) and PRE. HPRE allows arbitrary evaluations on ciphertexts under one public key and transforms the result to another public key using a re-encryption key. We propose a generic construction of a single-hop HPRE scheme that supports fully homomorphic operations and is proven secure in our new CCA-HPRE model.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Engineering, Electrical & Electronic
Huy Vu Ngoc, J. R. R. Mayer, Elie Bitar-Nehme
Summary: The use of SLSTMs and SGRUs models allows for prediction and compensation of the effects of temperature changes on TCP deviations in a five-axis machine tool.
Article
Physics, Multidisciplinary
Junyi Chen, Yingjie Han, Xiabing Zhou, Hongying Zan, Qinglei Zhou
Summary: In this paper, the authors propose a label-enhanced prototypical network (LPN) for legal judgment prediction (LJP). LPN addresses the issue of imbalanced label distributions by employing uniform encoding and separate decoding. Experimental results demonstrate that the proposed method effectively improves the performance of LJP.
Article
Mathematics, Interdisciplinary Applications
Siddra Habib, Amreen Batool, Asad Islam, Muhammad Nadeem, Khaled A. Gepreel, Ji-huan He
Summary: This paper demonstrates the use of the fractional He-Laplace method to study a nonlinear coupled system of equations with time fractional derivative. The method is shown to provide an effective and convenient way to obtain solutions in the form of convergent series, without restrictions, and is validated through graphical representation and error estimate.
FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY
(2021)