Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Ilaria Chillotti"'
Publikováno v:
Chillotti, I, Orsini, E, Scholl, P, Smart, N P & Leeuwen, B V 2022, Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE . in C Galdi & S Jarecki (eds), Security and Cryptography for Networks. SCN 2022 . Springer, Cham, Lecture Notes in Computer Science, vol. 13409, pp. 540-563, 13th Conference on Security and Cryptography For Networks, Almafi, Italy, 12/09/2022 . https://doi.org/10.1007/978-3-031-14791-3_24
Lecture Notes in Computer Science ISBN: 9783031147906
Lecture Notes in Computer Science ISBN: 9783031147906
ispartof: pages:540-563 ispartof: SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022) vol:13409 pages:540-563 ispartof: 13th Conference on Security and Cryptography for Networks (SCN) location:ITALY, Amalfi date:12 Sep - 14 Sep 2022 status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6fc346e064cad2d4de7c264302541e08
https://lirias.kuleuven.be/handle/20.500.12942/709840
https://lirias.kuleuven.be/handle/20.500.12942/709840
Publikováno v:
Journal of Cryptology. 33:34-91
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW and its ring variants. The simplest FHE schemes consist in bootstrapped b
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030780852
CSCML
CSCML
In many cases, machine learning and privacy are perceived to be at odds. Privacy concerns are especially relevant when the involved data are sensitive. This paper deals with the privacy-preserving inference of deep neural networks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d98acacccac3814052b4ad845eb90192
https://doi.org/10.1007/978-3-030-78086-9_1
https://doi.org/10.1007/978-3-030-78086-9_1
Autor:
David Froelicher, Wonhee Cho, Nicolas Gama, Duhyeong Kim, Miran Kim, Arif Harmanci, Jean-Pierre Hubaux, Jean-Philippe Bossuat, Sergiu Carpov, Mariya Georgieva, Yongha Son, Kristin E. Lauter, Seungwan Hong, Lucila Ohno-Machado, Yongsoo Song, Yiping Ma, Ilaria Chillotti, Jung Hee Cheon, Juan Ramón Troncoso-Pastoriza, Heidi J. Sofia, Xiaoqian Jiang
Genotype imputation is a fundamental step in genomic data analysis such as GWAS, where missing variant genotypes are predicted using the existing genotypes of nearby ‘tag’ variants. Imputation greatly decreases the genotyping cost and provides hi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::64c02307c3c5e996b072e05ece34cf97
https://doi.org/10.1101/2020.07.02.183459
https://doi.org/10.1101/2020.07.02.183459
Autor:
Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi
Publikováno v:
29th USENIX Security Symposium
Publikováno v:
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176556
EUROCRYPT (2)
EUROCRYPT (2)
Since Cheon et al. introduced a homomorphic encryption scheme for approximate arithmetic (Asiacrypt ’17), it has been recognized as suitable for important real-life usecases of homomorphic encryption, including training of machine learning models o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4be0fd61071b28308dc622780bcd147b
https://doi.org/10.1007/978-3-030-17656-3_2
https://doi.org/10.1007/978-3-030-17656-3_2
Publikováno v:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
CCS
CCS
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to hide access pattern to its data encrypted and stored at a remote server. Traditionally, ORAM algorithms assume the server acts purely as a storage device. Under this assumption
Publikováno v:
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
In this paper, we propose a Multi-Key Homomorphic Encryption (MKHE) scheme by generalizing the low-latency homomorphic encryption by Chillotti et al. (ASIACRYPT 2016). Our scheme can evaluate a binary gate on ciphertexts encrypted under different key
Autor:
Stanislav Peceny, Christina Boura, Ilaria Chillotti, Nicolas Gama, Alexander Petric, Dimitar Jetchev
Publikováno v:
In Proceedings of Financial Cryptography and Data Security-(FC) 2018
In Proceedings of Financial Cryptography and Data Security-(FC) 2018, 2018, Nieuwpoort, Curaçao. ⟨10.1007/978-3-662-58387-6_10⟩
Financial Cryptography and Data Security ISBN: 9783662583869
Financial Cryptography
In Proceedings of Financial Cryptography and Data Security-(FC) 2018, 2018, Nieuwpoort, Curaçao. ⟨10.1007/978-3-662-58387-6_10⟩
Financial Cryptography and Data Security ISBN: 9783662583869
Financial Cryptography
We propose a novel multi-party computation protocol for evaluating continuous real-valued functions with high numerical precision. Our method is based on approximations with Fourier series and uses at most two rounds of communication during the onlin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::111864feb0b3e6e53c0ab073f76d6575
https://hal.uvsq.fr/hal-02171949
https://hal.uvsq.fr/hal-02171949
Publikováno v:
Advances in Cryptology – ASIACRYPT 2017. ASIACRYPT 2017. Lecture Notes in Computer Science
Advances in Cryptology – ASIACRYPT 2017. ASIACRYPT 2017. Lecture Notes in Computer Science, Dec 2017, Hong Kong, China. pp.377-408, ⟨10.1007/978-3-319-70694-8_14⟩
Advances in Cryptology – ASIACRYPT 2017 ISBN: 9783319706931
ASIACRYPT (1)
Advances in Cryptology – ASIACRYPT 2017. ASIACRYPT 2017. Lecture Notes in Computer Science, Dec 2017, Hong Kong, China. pp.377-408, ⟨10.1007/978-3-319-70694-8_14⟩
Advances in Cryptology – ASIACRYPT 2017 ISBN: 9783319706931
ASIACRYPT (1)
Conference of 23rd Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2017 ; Conference Date: 3 December 2017 Through 7 December 2017; Conference Code:207879; International audience; In this pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bce8a3648c407c376576ba8840cd4c32
https://cea.hal.science/cea-01832760
https://cea.hal.science/cea-01832760