Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Bootstrap** Bits with CKKS

    The Cheon–Kim–Kim–Song (CKKS) fully homomorphic encryption scheme is designed to efficiently perform computations on real numbers in an encrypted state. Recently, Drucker et al [J. Cryptol.] proposed an efficient...

    Young** Bae, Jung Hee Cheon, Jaehyung Kim in Advances in Cryptology – EUROCRYPT 2024 (2024)

  2. No Access

    Chapter and Conference Paper

    SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the Limits

    Recently, NIST has announced Kyber, a lattice-based key encapsulation mechanism (KEM), as a post-quantum standard. However, it is not the most efficient scheme among the NIST’s KEM finalists. Saber enjoys more...

    Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong in Selected Areas in Cryptography – SAC 2023 (2024)

  3. No Access

    Chapter and Conference Paper

    HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering

    Most of the current fully homomorphic encryption (FHE) schemes are based on either the learning-with-errors (LWE) problem or on its ring variant (RLWE) for storing plaintexts. During the homomorphic computatio...

    Young** Bae, Jung Hee Cheon, Jaehyung Kim in Advances in Cryptology – CRYPTO 2023 (2023)

  4. No Access

    Article

    Efficient verifiable computation over quotient polynomial rings

    In a situation where computation and data are delegated to the third party, e.g., in cloud computing services, securing both data privacy and computation integrity simultaneously has been a challenging problem...

    Jai Hyun Park, Jung Hee Cheon, Dongwoo Kim in International Journal of Information Security (2022)

  5. No Access

    Article

    Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions

    A weak pseudorandom function (weak PRF) is one of the most important cryptographic primitives for its efficiency although it has lower security than a standard PRF. Recently, Boneh et al. (in: Theory of crypto...

    Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim in Designs, Codes and Cryptography (2022)

  6. Article

    Open Access

    Secure tumor classification by shallow neural network using homomorphic encryption

    Disclosure of patients’ genetic information in the process of applying machine learning techniques for tumor classification hinders the privacy of personal information. Homomorphic Encryption (HE), which suppo...

    Seungwan Hong, Jai Hyun Park, Wonhee Cho, Hyeongmin Choe, Jung Hee Cheon in BMC Genomics (2022)

  7. No Access

    Book and Conference Proceedings

    Post-Quantum Cryptography

    13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings

    Jung Hee Cheon, Thomas Johansson in Lecture Notes in Computer Science (2022)

  8. No Access

    Chapter and Conference Paper

    Limits of Polynomial Packings for \(\mathbb {Z}_{p^k}\) and \(\mathbb {F}_{p^k}\)

    We formally define polynomial packing methods and initiate a unified study of related concepts in various contexts of cryptography. This includes homomorphic encryption (HE) packing and reverse multiplication-...

    Jung Hee Cheon, Keewoo Lee in Advances in Cryptology – EUROCRYPT 2022 (2022)

  9. Chapter

    Correction to: Introduction to Homomorphic Encryption and Schemes

    The original version of this book has been revised because it was inadvertently published with the following errors which have now been updated.

    Jung Hee Cheon, Anamaria Costache in Protecting Privacy through Homomorphic Enc… (2021)

  10. No Access

    Chapter and Conference Paper

    MHz2k: MPC from HE over \(\mathbb {Z}_{2^k}\) with New Packing, Simpler Reshare, and Better ZKP

    We propose a multi-party computation (MPC) protocol over \(\mathbb {Z}_{2^k}\) ...

    Jung Hee Cheon, Dongwoo Kim, Keewoo Lee in Advances in Cryptology – CRYPTO 2021 (2021)

  11. Chapter and Conference Paper

    Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions

    A weak pseudorandom function (weak PRF) is one of the most important cryptographic primitives for its efficiency although it has lower security than a standard PRF.

    Jung Hee Cheon, Wonhee Cho, Jeong Han Kim in Public-Key Cryptography – PKC 2021 (2021)

  12. No Access

    Chapter and Conference Paper

    Lattice-Based Secure Biometric Authentication for Hamming Distance

    Biometric authentication is a protocol which verifies a user’s authority by comparing her biometric with the pre-enrolled biometric template stored in the server. Biometric authentication is convenient and rel...

    Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Joohee Lee in Information Security and Privacy (2021)

  13. No Access

    Book and Conference Proceedings

    Post-Quantum Cryptography

    12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings

    Jung Hee Cheon, Jean-Pierre Tillich in Lecture Notes in Computer Science (2021)

  14. No Access

    Chapter

    Introduction to Homomorphic Encryption and Schemes

    Homomorphic encryption (HE) enables processing encrypted data without decrypting it. This technology can be used, for example, to allow a public cloud to operate on secret data without the cloud learning anyth...

    Jung Hee Cheon, Anamaria Costache in Protecting Privacy through Homomorphic Enc… (2021)

  15. Article

    Open Access

    Privacy-preserving approximate GWAS computation based on homomorphic encryption

    One of three tasks in a secure genome analysis competition called iDASH 2018 was to develop a solution for privacy-preserving GWAS computation based on homomorphic encryption. The scenario is that a data holde...

    Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong in BMC Medical Genomics (2020)

  16. Chapter and Conference Paper

    Efficient Homomorphic Comparison Methods with Optimal Complexity

    Comparison of two numbers is one of the most frequently used operations, but it has been a challenging task to efficiently compute the comparison function in homomorphic encryption (HE) which basically support...

    Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim in Advances in Cryptology – ASIACRYPT 2020 (2020)

  17. No Access

    Chapter and Conference Paper

    Efficient Identity-Based Encryption from LWR

    The Learning with Rounding (LWR) problem is a deterministic variant of the classical Learning with Errors (LWE) problem, for which sampling an instance does not involve discrete Gaussian sampling. We propose t...

    Jung Hee Cheon, Hae** Cho, Jaewook Jung in Information Security and Cryptology – ICIS… (2020)

  18. No Access

    Chapter and Conference Paper

    Faster Bootstrap** of FHE over the Integers

    In FHE over the integers, decryption function is simplified by sparse subset subset sum problem (SSSP) assumption, which is introduced by Dijk et al. (Eurocrypt 2010), so that bootstrap** can be achieved suc...

    Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim in Information Security and Cryptology – ICIS… (2020)

  19. No Access

    Chapter and Conference Paper

    Towards a Practical Cluster Analysis over Encrypted Data

    Cluster analysis is one of the most significant unsupervised machine learning methods, and it is being utilized in various fields associated with privacy issues including bioinformatics, finance and image proc...

    Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park in Selected Areas in Cryptography – SAC 2019 (2020)

  20. Article

    Open Access

    A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side

    Single Nucleotide Polymorphism (SNP) in the genome has become crucial information for clinical use. For example, the targeted cancer therapy is primarily based on the information which clinically important SNP...

    Sungjoon Park, Minsu Kim, Seokjun Seo, Seungwan Hong, Kyoohyung Han in BMC Genomics (2019)

previous disabled Page of 4