Homomorphic Encryption

Benefits & Challenges

Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
A. Acar, H. Aksu, A. S. Uluagac, and M. Conti. “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”. In: 51.4 (2018). issn: 0360-0300. doi: 10.1145/3214303.
E. Maass. Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy. 2020.
M. D. Ryan. “Cloud computing security: The scientific challenge, and a survey of solutions”. In: Journal of Systems and Software 86.9 (2013), pp. 2263–2268. issn: 0164-1212. doi: 10.1016/ j.jss.2012.12.025.
C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan. Gazelle: A Low Latency Framework for Secure Neural Network Inference. 2018. arXiv: 1801.05507 [[cs.CR](http://cs.cr/)].
A. S. Gillis. Homomorphic Encryption. 2022. (visited on 05/23/2023).

R. Yackel. What is homomorphic encryption, and why isn’t it mainstream? 2021. (visited on 05/23/2023).
R. Awadallah and A. Samsudin. “Homomorphic encryption for cloud computing and its challenges”. In: 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS). IEEE. 2020, pp. 1–6. doi: 10.1109/ICETAS51660.2020.9484283.

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
Chainlink. Homomorphic Encryption. 2023.
J. Contreras. Homomorphic encryption with SEAL.
Homomorphic Encryption Standardization. Introduction.
K. El Makkaoui, A. Ezzati, and A. B. Hssane. “Challenges of using homomorphic encryption to secure cloud computing”. In: 2015 International Conference on Cloud Technologies and Applications (CloudTech). IEEE. 2015, pp. 1–7. doi:10.1109/CloudTech. 2015.7337011.

Congratulations, you've completed all chapters!

You've completed all chapters. You can review the course or start a new one.