Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption

    In this manuscript, we develop a multi-party framework tailored for multiple data contributors seeking machine learning insights from combined data sources. Grounded in statistical learning principles, we intr...

    David Ha Eun Kang, Duhyeong Kim, Yongsoo Song, Dongwon Lee in Scientific Reports (2024)

  2. Article

    Open Access

    On the Concrete Security of LWE With Small Secret

    Lattice-based cryptography is currently under consideration for standardization in the ongoing NIST PQC Post-Quantum Cryptography competition, and is used as the basis for Homomorphic Encryption schemes world-...

    Lynn Chua, Hao Chen, Yongsoo Song, Kristin Lauter in La Matematica (2024)

  3. No Access

    Chapter and Conference Paper

    Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity

    Multi-key homomorphic encryption is a generalized notion of homomorphic encryption supporting arbitrary computation on ciphertexts, possibly encrypted under different keys. In this paper, we revisit the work o...

    Hyesun Kwak, Seonhong Min, Yongsoo Song in Public-Key Cryptography – PKC 2024 (2024)

  4. No Access

    Chapter and Conference Paper

    A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation

    Homomorphic Encryption (HE) is a useful primitive for secure computation, but it is not generally applicable when multiple parties are involved, as the authority is solely concentrated in a single party, the s...

    Hyesun Kwak, Dongwon Lee, Yongsoo Song in Applied Cryptography and Network Security (2024)

  5. No Access

    Chapter and Conference Paper

    Accelerating HE Operations from Key Decomposition Technique

    Lattice-based homomorphic encryption (HE) schemes are based on the noisy encryption technique, where plaintexts are masked with some random noise for security. Recent advanced HE schemes rely on a decompositio...

    Miran Kim, Dongwon Lee, **yeong Seo, Yongsoo Song in Advances in Cryptology – CRYPTO 2023 (2023)

  6. No Access

    Chapter and Conference Paper

    Toward Practical Lattice-Based Proof of Knowledge from Hint-MLWE

    In the last decade, zero-knowledge proof of knowledge protocols have been extensively studied to achieve active security of various cryptographic protocols. However, the existing solutions simply seek zero-kno...

    Duhyeong Kim, Dongwon Lee, **yeong Seo in Advances in Cryptology – CRYPTO 2023 (2023)

  7. Chapter

    Correction to: Introduction to Homomorphic Encryption and Schemes

    The original version of this book has been revised because it was inadvertently published with the following errors which have now been updated.

    Jung Hee Cheon, Anamaria Costache in Protecting Privacy through Homomorphic Enc… (2021)

  8. No Access

    Chapter and Conference Paper

    Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts

    In the past few years, significant progress on homomorphic encryption (HE) has been made toward both theory and practice. The most promising HE schemes are based on the hardness of the Learning With Errors (LW...

    Hao Chen, Wei Dai, Miran Kim, Yongsoo Song in Applied Cryptography and Network Security (2021)

  9. No Access

    Chapter and Conference Paper

    Lattice-Based Secure Biometric Authentication for Hamming Distance

    Biometric authentication is a protocol which verifies a user’s authority by comparing her biometric with the pre-enrolled biometric template stored in the server. Biometric authentication is convenient and rel...

    Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Joohee Lee in Information Security and Privacy (2021)

  10. No Access

    Chapter

    Introduction to Homomorphic Encryption and Schemes

    Homomorphic encryption (HE) enables processing encrypted data without decrypting it. This technology can be used, for example, to allow a public cloud to operate on secret data without the cloud learning anyth...

    Jung Hee Cheon, Anamaria Costache in Protecting Privacy through Homomorphic Enc… (2021)

  11. Article

    Open Access

    Semi-Parallel logistic regression for GWAS on encrypted data

    The sharing of biomedical data is crucial to enable scientific discoveries across institutions and improve health care. For example, genome-wide association studies (GWAS) based on a large number of samples ca...

    Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio in BMC Medical Genomics (2020)

  12. Chapter and Conference Paper

    Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning

    Computing on data in a manner that preserve the privacy is of growing importance. Multi-Party Computation (MPC) and Homomorphic Encryption (HE) are two cryptographic techniques for privacy-preserving computati...

    Hao Chen, Miran Kim, Ilya Razenshteyn in Advances in Cryptology – ASIACRYPT 2020 (2020)

  13. No Access

    Chapter and Conference Paper

    Multi-Key Homomorphic Encryption from TFHE

    In this paper, we propose a Multi-Key Homomorphic Encryption (MKHE) scheme by generalizing the low-latency homomorphic encryption by Chillotti et al. (ASIACRYPT 2016). Our scheme can evaluate a binary gate on ...

    Hao Chen, Ilaria Chillotti, Yongsoo Song in Advances in Cryptology – ASIACRYPT 2019 (2019)

  14. Chapter and Conference Paper

    A Full RNS Variant of Approximate Homomorphic Encryption

    The technology of Homomorphic Encryption (HE) has improved rapidly in a few years. The newest HE libraries are efficient enough to use in practical applications. For example, Cheon et al. (ASIACRYPT’17) propos...

    Jung Hee Cheon, Kyoohyung Han, Andrey Kim in Selected Areas in Cryptography – SAC 2018 (2019)

  15. No Access

    Chapter and Conference Paper

    Improved Bootstrap** for Approximate Homomorphic Encryption

    Since Cheon et al. introduced a homomorphic encryption scheme for approximate arithmetic (Asiacrypt ’17), it has been recognized as suitable for important real-life usecases of homomorphic encryption, includin...

    Hao Chen, Ilaria Chillotti, Yongsoo Song in Advances in Cryptology – EUROCRYPT 2019 (2019)

  16. No Access

    Chapter and Conference Paper

    Approximate Homomorphic Encryption over the Conjugate-Invariant Ring

    The Ring Learning with Errors (RLWE) problem over a cyclotomic ring has been the most widely used hardness assumption for the construction of practical homomorphic encryption schemes. However, this restricted ...

    Duhyeong Kim, Yongsoo Song in Information Security and Cryptology – ICISC 2018 (2019)

  17. Article

    Open Access

    Logistic regression model training based on the approximate homomorphic encryption

    Security concerns have been raised since big data became a prominent tool in data analysis. For instance, many machine learning algorithms aim to generate prediction models using training data which contain se...

    Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon in BMC Medical Genomics (2018)

  18. No Access

    Chapter and Conference Paper

    Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR

    The LWE problem has been widely used in many constructions for post-quantum cryptography due to its reduction from the worst-case of lattice hard problems and the lightweight operations for generating its inst...

    Jung Hee Cheon, Duhyeong Kim, Joohee Lee in Security and Cryptography for Networks (2018)

  19. Chapter and Conference Paper

    Bootstrap** for Approximate Homomorphic Encryption

    This paper extends the leveled homomorphic encryption scheme for an approximate arithmetic of Cheon et al. (ASIACRYPT 2017) to a fully homomorphic encryption, i.e., we propose a new technique to refresh low-le...

    Jung Hee Cheon, Kyoohyung Han, Andrey Kim in Advances in Cryptology – EUROCRYPT 2018 (2018)

  20. Article

    Open Access

    Secure searching of biomarkers through hybrid homomorphic encryption scheme

    As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. We are interested in designing ...

    Miran Kim, Yongsoo Song, Jung Hee Cheon in BMC Medical Genomics (2017)

previous disabled Page of 2