Publications on Lattice Crypto Scheme Implementations in OpenFHE

Homomorphic Encryption

  • Liu, Z., Micciancio, D., and Polyakov, Y., “Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping”, [https://eprint.iacr.org/2021/1337].

  • Kim, A., Polyakov, Y., and Zucca, V., “Revisiting Homomorphic Encryption Schemes for Finite Fields”, ASIACRYPT 2021 [https://eprint.iacr.org/2021/204].

  • Kim, A., Papadimitriou, A., and Polyakov, Y., “Approximate Homomorphic Encryption with Reduced Approximation Error”, [https://eprint.iacr.org/2020/1118].

  • Micciancio, D. and Polyakov, Y., “Bootstrapping in FHEW-like Cryptosystems”, WAHC 2021 – 9th Workshop on Encrypted Computing & Applied Homomorphic Cryptography [https://eprint.iacr.org/2020/086].

  • Al Badawi, A., Polyakov, Y., Mi Mi Aung, K., Veeravalli, B., and Rohloff, K., “Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme”, IEEE Transactions on Emerging Topics in Computing (IEEE TETC), to appear [https://eprint.iacr.org/2018/589].

  • Blatt, M., Gusev, A., Polyakov, Y., Rohloff, K., and Vaikuntanathan, V., “Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies”, BMC Medical Genomics, to appear [https://eprint.iacr.org/2019/223].

  • Halevi, S., Polyakov, Y., and Shoup, V., “An Improved RNS Variant of the BFV Homomorphic Encryption Scheme”, CT-RSA 2019, pp. 83-105 [https://eprint.iacr.org/2018/117].

  • Archer, D., Calderon Trilla, J.M., Dagit, J., Malozemoff, A., Polyakov, Y., Rohloff, K., Ryan, G., “RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications”, WAHC’19 Proceedings of the 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 57-68 [https://eprint.iacr.org/2019/988].

  • Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov, “Building Applications with Homomorphic Encryption”, ACM CCS 2018, pp. 2160-2162.

Proxy Re-Encryption

  • Polyakov, Y., Rohloff, K., Sahu, G., and Vaikuntanathan, V., “Fast Proxy Re-Encryption for Publish/Subscribe Systems”, ACM Transactions on Privacy and Security (ACM TOPS), 2017, Vol. 20, No. 4, pp. 14:1-14:34 [http://eprint.iacr.org/2017/410].

Schemes Based on Lattice Trapdoors (Signature, IBE, ABE, Obfuscation)

  • Cheng, C., Genise, N., Micciancio, D., Polyakov, Y., and Rohloff, K., “Implementing Token-Based Obfuscation under (Ring) LWE”, [https://eprint.iacr.org/2018/1222].

  • Genise, N., Micciancio, D., and Polyakov, Y., “Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More”, EUROCRYPT 2019, pp. 655-684 [https://eprint.iacr.org/2018/946].

  • Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., Sajjadpour, H., and Savaş, E., “Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices”, IEEE Transactions on Computers (IEEE TC), 2019, Vol. 68, No. 4, pp. 570 - 584 [https://eprint.iacr.org/2017/1254].

  • Cousins, D. B., Di Crescenzo, G., Gür, K. D., King, K., Polyakov, Y., Rohloff, R., Ryan, G. W., and Savaş, E., “Implementing Conjunction Obfuscation under Entropic Ring LWE”, 2018 IEEE Symposium on Security and Privacy (SP), pp. 354-371 [https://eprint.iacr.org/2017/844].

  • Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş, E., and Sunar, B., “Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme”, IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2018, Vol. 13, No. 5, pp. 1169-1184 [http://eprint.iacr.org/2017/601].

  • Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., and Savaş, E., “Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors”, WAHC’18 Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 61-71[http://eprint.iacr.org/2017/285].