Publications on Lattice Crypto Scheme Implementations in OpenFHE

Homomorphic Encryption

  • Liu, Z., Micciancio, D., and Polyakov, Y., “Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping”, ASIACRYPT 2022 [https://eprint.iacr.org/2021/1337].

  • Kim, A., Papadimitriou, A., and Polyakov, Y., “Approximate Homomorphic Encryption with Reduced Approximation Error”, CT-RSA 2022 [https://eprint.iacr.org/2020/1118].

  • Kim, A., Polyakov, Y., and Zucca, V., “Revisiting Homomorphic Encryption Schemes for Finite Fields”, ASIACRYPT 2021 [https://eprint.iacr.org/2021/204].

  • Micciancio, D. and Polyakov, Y., “Bootstrapping in FHEW-like Cryptosystems”, WAHC 2021 – 9th Workshop on Encrypted Computing & Applied Homomorphic Cryptography [https://eprint.iacr.org/2020/086].

  • Al Badawi, A., Polyakov, Y., Mi Mi Aung, K., Veeravalli, B., and Rohloff, K., “Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme”, IEEE Transactions on Emerging Topics in Computing (IEEE TETC), 2021, Vol. 9, No. 2., pp. 941-956 [https://eprint.iacr.org/2018/589].

  • Blatt, M., Gusev, A., Polyakov, Y., Rohloff, K., and Vaikuntanathan, V., “Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies”, BMC Medical Genomics, 2020, Vol. 13, Suppl. 7, No. 83 [https://eprint.iacr.org/2019/223].

  • Halevi, S., Polyakov, Y., and Shoup, V., “An Improved RNS Variant of the BFV Homomorphic Encryption Scheme”, CT-RSA 2019, pp. 83-105 [https://eprint.iacr.org/2018/117].

  • Archer, D., Calderon Trilla, J.M., Dagit, J., Malozemoff, A., Polyakov, Y., Rohloff, K., Ryan, G., “RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications”, WAHC’19 Proceedings of the 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 57-68 [https://eprint.iacr.org/2019/988].

  • Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov, “Building Applications with Homomorphic Encryption”, ACM CCS 2018, pp. 2160-2162.

Proxy Re-Encryption

  • Polyakov, Y., Rohloff, K., Sahu, G., and Vaikuntanathan, V., “Fast Proxy Re-Encryption for Publish/Subscribe Systems”, ACM Transactions on Privacy and Security (ACM TOPS), 2017, Vol. 20, No. 4, pp. 14:1-14:34 [http://eprint.iacr.org/2017/410].

Schemes Based on Lattice Trapdoors (Signature, IBE, ABE, Obfuscation)

  • Cheng, C., Genise, N., Micciancio, D., Polyakov, Y., and Rohloff, K., “Implementing Token-Based Obfuscation under (Ring) LWE”, [https://eprint.iacr.org/2018/1222].

  • Genise, N., Micciancio, D., and Polyakov, Y., “Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More”, EUROCRYPT 2019, pp. 655-684 [https://eprint.iacr.org/2018/946].

  • Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., Sajjadpour, H., and Savaş, E., “Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices”, IEEE Transactions on Computers (IEEE TC), 2019, Vol. 68, No. 4, pp. 570 - 584 [https://eprint.iacr.org/2017/1254].

  • Cousins, D. B., Di Crescenzo, G., Gür, K. D., King, K., Polyakov, Y., Rohloff, R., Ryan, G. W., and Savaş, E., “Implementing Conjunction Obfuscation under Entropic Ring LWE”, 2018 IEEE Symposium on Security and Privacy (SP), pp. 354-371 [https://eprint.iacr.org/2017/844].

  • Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş, E., and Sunar, B., “Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme”, IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2018, Vol. 13, No. 5, pp. 1169-1184 [http://eprint.iacr.org/2017/601].

  • Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., and Savaş, E., “Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors”, WAHC’18 Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 61-71[http://eprint.iacr.org/2017/285].