Homomorphic Encryption

Applications & Examples

Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13
Slide 14

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
M. Blake, J. McWaters, and R. Galaski. “The next generation of data-sharing in financial services: Using privacy enhancing techniques to unlock new value”. In: World Economic Forum. 2019, pp. 1–36.
A. Acar, H. Aksu, A. S. Uluagac, and M. Conti. “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”. In: 51.4 (2018). issn: 0360-0300. doi: 10.1145/3214303.
N. Dowlin, R. Gilad-Bachrach, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Tech. rep. MSR-TR-2016-3. 2016.
E. Maass. Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy. 2020. (visited on 05/23/2023).
A. S. Gillis. Homomorphic Encryption. 2022. (visited on 05/23/2023).

R. Yackel. What is homomorphic encryption, and why isn’t it mainstream? 2021. (visited on 05/23/2023).
A. Wood, K. Najarian, and D. Kahrobaei. “Homomorphic encryption for machine learning in medicine and bioinformatics”. In: ACM Computing Surveys (CSUR) 53.4 (2020), pp. 1–35. doi: 10.1145/3394658.

Congratulations, you've completed all chapters!

You've completed all chapters. You can review the course or start a new one.