Homomorphic Encryption

Definitions & Characteristics

Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13
Slide 14
Slide 15
Slide 16
Slide 17

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
A. Acar, H. Aksu, A. S. Uluagac, and M. Conti. “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”. In: 51.4 (2018). issn: 0360-0300. doi: 10.1145/3214303.
C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan. Gazelle: A Low Latency Framework for Secure Neural Network Inference. 2018. arXiv: 1801.05507 [[cs.CR](http://cs.cr/)].
N. Dowlin, R. Gilad-Bachrach, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Tech. rep. MSR-TR-2016-3. 2016.
IBM. IBM Security Homomorphic Encryption Services. Brochure. 2020.
R. Lagendijk, Z. Erkin, and M. Barni. “Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation”. In: IEEE Signal Processing Magazine (2013), pp. 82–105. doi: 10.1109/ MSP.2012.2219653.
L. Rosencrance. Ciphertext. 2020.
E. Maass. Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy. 2020.

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
M. D. Ryan. “Cloud computing security: The scientific challenge, and a survey of solutions”. In: Journal of Systems and Software 86.9 (2013), pp. 2263–2268. issn: 0164-1212. doi: 10.1016/j.jss.2012.12.025.
D. Huynh. Homomorphic Encryption intro: Part 2: HE landscape and CKKS. 2020.
D. Huynh. Homomorphic Encryption intro: Part 1: Overview and use cases. 2020.
R. Yackel. What is homomorphic encryption, and why isn’t it mainstream? 2021.
A. S. Gillis. Homomorphic Encryption. 2022.
Optalysys. Encrypted search using fully homomorphic encryption. 2021.
A. Wood, K. Najarian, and D. Kahrobaei. “Homomorphic encryption for machine learning in medicine and bioinformatics”. In: ACM Computing Surveys (CSUR) 53.4 (2020), pp. 1–35. doi: 10.1145/3394658.

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
R. Awadallah and A. Samsudin. “Homomorphic encryption for cloud computing and its challenges”. In: 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS). IEEE. 2020, pp. 1–6. doi: 10.1109/ ICETAS51660.2020. 9484283.
S. Yakoubov, V. Gadepally, N. Schear, E. Shen, and A. Yerukhimovich. “A survey of cryptographic approaches to securing big-data analytics in the cloud”. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC). IEEE. 2014, pp. 1–6. doi: 10.1109/HPEC.2014.7040943.
Chainlink. Homomorphic Encryption. 2023.
C. Gentry. “Fully homomorphic encryption using ideal lattices”. In: Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009, pp. 169–178. doi: 10.1145/1536414.1536440

Congratulations, you've completed all chapters!

You've completed all chapters. You can review the course or start a new one.