We’re fortunate that there have been high-quality publications related to PALISADE and precursor projects.
Applications of Homomorphic Encryption
- Ishimaki, Y. and Yamana H., Faster Homomorphic Trace-Type Function Evaluation, IEEE Access, 2021, Vol. 9, pp. 53061 – 53077.
- Blatt, M., Gusev, A., Polyakov, Y., Goldwasser, S., “Secure Large-Scale Genome-Wide Association Studies using Homomorphic Encryption”, Proceedings of the National Academy of Sciences (PNAS), 2020, Vol. 117, No. 21 [https://eprint.iacr.org/2020/563].
- Blatt, M., Gusev, A., Polyakov, Y., Rohloff, K., and Vaikuntanathan, V., “Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies”, BMC Medical Genomics, 2020, Vol. 13, Suppl. 7, No. 83 [https://eprint.iacr.org/2019/223].
- Archer, D., Calderon Trilla, J.M., Dagit, J., Malozemoff, A., Polyakov, Y., Rohloff, K., Ryan, G., “RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications”, WAHC’19 Proceedings of the 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 57-68 [https://eprint.iacr.org/2019/988].
- Nick Barlow, Tomas Lazauskas, Oliver Strickson, Adria Gascon , “SHEEP: a Homomorphic Encryption Evaluation Platform”, WAHC’19 Proceedings of the 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
- Y. Yamada, K. Rohloff and M. Oguchi, “Homomorphic Encryption for Privacy-Preserving Genome Sequences Search,” 2019 IEEE International Conference on Smart Computing (SMARTCOMP), Washington, DC, USA, 2019, pp. 7-12.
- Ishimaki Y., Yamana H. (2018) Non-Interactive and Fully Output Expressive Private Comparison. In: Chakraborty D., Iwata T. (eds) Progress in Cryptology – INDOCRYPT 2018. INDOCRYPT 2018. Lecture Notes in Computer Science, vol 11356. Springer, Cham
- Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov, “Building Applications with Homomorphic Encryption”, ACM CCS 2018, pp. 2160-2162.
- Kurt Rohloff, David Bruce Cousins and Daniel Sumorok. Scalable, Practical VoIP Teleconferencing with End-to-End Homomorphic Encryption. Accepted to IEEE Transactions on Information Forensics and Security (IEEE TIFS). https://web.njit.edu/~rohloff/papers/2017/Rohloff_Cousins_Sumorok_TIFS_revision.pdf
- Kurt Rohloff “Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption.” The 2nd IEEE International Conference on Cyber Security and Cloud Computing. Nov. 3-5, 2015.
- Kurt Rohloff, Yuriy Polyakov “An End-to-End Security Architecture to Collect, Process and Share Wearable Medical Device Data.” 17th International Conference on E-health Networking, Application & Services (HealthCom). Oct. 14-17 2015.
Homomorphic Encryption in Software
- Liu, Z., Micciancio, D., and Polyakov, Y., “Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping”, [https://eprint.iacr.org/2021/1337].
- Kim, A., Polyakov, Y., and Zucca, V., “Revisiting Homomorphic Encryption Schemes for Finite Fields”, ASIACRYPT 2021 [https://eprint.iacr.org/2021/204].
- Kim, A., Papadimitriou, A., and Polyakov, Y., “Approximate Homomorphic Encryption with Reduced Approximation Error”, [https://eprint.iacr.org/2020/1118].
- Micciancio, D. and Polyakov, Y., “Bootstrapping in FHEW-like Cryptosystems”, WAHC 2021 – 9th Workshop on Encrypted Computing & Applied Homomorphic Cryptography [https://eprint.iacr.org/2020/086].
- Jean Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca, Note on the noise growth of the RNS variants of the BFV scheme, Cryptology ePrint Archive, Report 2019/1266, https://eprint.iacr.org/2019/1266
- Halevi, S., Polyakov, Y., and Shoup, V., “An Improved RNS Variant of the BFV Homomorphic Encryption Scheme”, CT-RSA 2019, pp. 83-105 [https://eprint.iacr.org/2018/117].
- Kurt Rohloff, David Bruce Cousins “A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU.” 2nd Workshop on Applied Homomorphic Cryptography and Encrypted Computing (WAHC). Mar. 7, 2014.
Hardware Acceleration of FHE
- Al Badawi, A., Polyakov, Y., Mi Mi Aung, K., Veeravalli, B., and Rohloff, K., “Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme”, IEEE Transactions on Emerging Topics in Computing (IEEE TETC), 2021, Vol. 9, No. 2., pp. 941-956 [https://eprint.iacr.org/2018/589].
- Takeshita, J., McKechney, C., Pajak, J., Papadimitriou, A., Karl, R., and Jung, T., “GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data”, [https://eprint.iacr.org/2021/1155].
- K. Rohloff, “Computer Arithmetic Research to Accelerate Privacy-Protecting Encrypted Computing Such as Homomorphic Encryption,” 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), Kyoto, Japan, 2019, pp. 197-197.
- David Bruce Cousins, Kurt Rohloff and Daniel Sumorok. Accelerating Secure Computing with a Dedicated FPGA-based Homomorphic Encryption Co-Processor. IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 2, pp. 193-206, April-June 1 2017. https://web.njit.edu/~rohloff/papers/2017/Rohloff_Cousins_Sumorok_TETC.pdf
- David Bruce Cousins, John Golusky, Kurt Rohloff, Daniel Sumorok “An FPGA Co-Processor Implementation of Homomorphic Encryption.” IEEE High Performance Extreme Computing Conference (HPEC). Jan. 6 2014.
- David Bruce Cousins, Kurt Rohloff, Chris Peikert, Rick Schantz. “An update on Scalable Implementation of Primitives for Homomorphic EncRyption – FPGA implementation using Simulink.” Sixteenth Annual Workshop on High Performance Embedded Computing (HPEC), Sept. 10, 2012.
- David Bruce Cousins, Kurt Rohloff, Chris Peikert, Rick Schantz. “SIPHER: Scalable Implementation of Primitives for Homomorphic EncRyption – FPGA implementation using Simulink.” Fifteenth Annual Workshop on High Performance Embedded Computing (HPEC), Sept. 21, 2011.
Proxy Re-Encryption
- L. Greenwald, K. Rohloff and D. Stott, “Secure Proxy-Reencryption-Based Inter-Network Key Exchange,” MILCOM 2018 – 2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, 2018, pp. 780-785. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8599794&isnumber=8599678
- Cristian Borcea, Arnab “Bobby” Deb Gupta, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan, PICADOR: End-to-end encrypted Publish–Subscribe information distribution with proxy re-encryption, Future Generation Computer Systems, Volume 71, 2017, Pages 177-191
- Polyakov, Y., Rohloff, K., Sahu, G., and Vaikuntanathan, V., “Fast Proxy Re-Encryption for Publish/Subscribe Systems”, ACM Transactions on Privacy and Security (ACM TOPS), 2017, Vol. 20, No. 4, pp. 14:1-14:34 [http://eprint.iacr.org/2017/410].
Schemes Based on Lattice Trapdoors (Signature, IBE, ABE, Obfuscation)
- Cheng, C., Genise, N., Micciancio, D., Polyakov, Y., and Rohloff, K., “Implementing Token-Based Obfuscation under (Ring) LWE”, [https://eprint.iacr.org/2018/1222].
- Cousins, D. B., Di Crescenzo, G., Gür, K. D., King, K., Polyakov, Y., Rohloff, R., Ryan, G. W., and Savaş, E., “Implementing Conjunction Obfuscation under Entropic Ring LWE”, 2018 IEEE Symposium on Security and Privacy (SP), pp. 354-371 [https://eprint.iacr.org/2017/844].
- Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş, E., and Sunar, B., “Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme”, IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2018, Vol. 13, No. 5, pp. 1169-1184 [http://eprint.iacr.org/2017/601].
Lattice Sampling
- Jeon, S., Lee, H.-S., and Park, J., Efficient Lattice Gadget Decomposition Algorithm With Bounded Uniform Distribution, IEEE Access, 2021, Vol. 9, pp. 17429 – 17437 [https://eprint.iacr.org/2021/048].
- Genise, N., Micciancio, D., and Polyakov, Y., “Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More”, EUROCRYPT 2019, pp. 655-684 [https://eprint.iacr.org/2018/946].
- Genise, N. J. (2019). Gadgets and Gaussians in Lattice-Based Cryptography (PhD Dissertation). UC San Diego. ProQuest ID: Genise_ucsd_0033D_18273. Merritt ID: ark:/13030/m5md43bb. Retrieved from https://escholarship.org/uc/item/8b40w7r8
- Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., Sajjadpour, H., and Savaş, E., “Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices”, IEEE Transactions on Computers (IEEE TC), 2019, Vol. 68, No. 4, pp. 570 – 584 [https://eprint.iacr.org/2017/1254].
- Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., and Savaş, E., “Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors”, WAHC’18 Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 61-71 [http://eprint.iacr.org/2017/285].