Dissertations / Theses on the topic 'Fully homomorphic encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 dissertations / theses for your research on the topic 'Fully homomorphic encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Fauzi, Prastudy. "On Fully Homomorphic Encryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.
Full textKing, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 50-51).
Fully homomorphic encryption (FHE) presents the possibility of removing the need to trust cloud providers with plaintext data. We present two new FHE scheme variants of BGV'12, both of which remove the need for key switching after a ciphertext multiplication, overall halving the runtime of bootstrapping. We also present multiple implementations of 32-bit integer addition evaluation, the fastest of which spends 16 seconds computing the addition circuit and 278 seconds bootstrapping. We nd that bootstrapping consumes approximately 90% of the computation time for integer addition and secure parameter settings are currently bottlenecked by the memory size of commodity hardware.
by Kevin C. King.
M. Eng.
Alperin-Sheriff, Jacob. "Towards practical fully homomorphic encryption." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53951.
Full textCetin, Gizem S. "Applications of Fully Homomorphic Encryption." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/526.
Full textFranzoni, Alice. "Fully Homomorphic Encryption e Possibili Applicazioni." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13568/.
Full textMinelli, Michele. "Fully homomorphic encryption for machine learning." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE056/document.
Full textFully homomorphic encryption enables computation on encrypted data without leaking any information about the underlying data. In short, a party can encrypt some input data, while another party, that does not have access to the decryption key, can blindly perform some computation on this encrypted input. The final result is also encrypted, and it can be recovered only by the party that possesses the secret key. In this thesis, we present new techniques/designs for FHE that are motivated by applications to machine learning, with a particular attention to the problem of homomorphic inference, i.e., the evaluation of already trained cognitive models on encrypted data. First, we propose a novel FHE scheme that is tailored to evaluating neural networks on encrypted inputs. Our scheme achieves complexity that is essentially independent of the number of layers in the network, whereas the efficiency of previously proposed schemes strongly depends on the topology of the network. Second, we present a new technique for achieving circuit privacy for FHE. This allows us to hide the computation that is performed on the encrypted data, as is necessary to protect proprietary machine learning algorithms. Our mechanism incurs very small computational overhead while keeping the same security parameters. Together, these results strengthen the foundations of efficient FHE for machine learning, and pave the way towards practical privacy-preserving deep learning. Finally, we present and implement a protocol based on homomorphic encryption for the problem of private information retrieval, i.e., the scenario where a party wants to query a database held by another party without revealing the query itself
Bonnoron, Guillaume. "A journey towards practical fully homomorphic encryption." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0073/document.
Full textCraig Gentry presented in 2009 the first fully homomorphic encryption scheme. Since then, a tremendous effort has been, and still is, dedicated by the cryptographic community to make practical this new kind of cryptography. It is revolutionnary because it enables direct computation on encrypted data (without the need for the computing entity to decrypt them). Several trends have been developed in parallel, exploring on one side fully homomorphic encryption schemes, more versatile for applications but more costly in terms of time and memory. On the other side, the somewhat homomorphic encryption schemes are less flexible but more efficient. This thesis, achieved within the Chair of Naval Cyber Defence, contributes to these trends. We have endorsed different roles. First, an attacker position to assess the hardness of the security assumptions of the proposals. Then, we conducted a state-of-the-art of the most promising schemes in order to identify the best(s) depending on the use-cases and to give precise advice to appropriately set the parameters that drive security level, ciphertext sizes and computation costs. Last, we endorsed a designer role. We proposed a new powerful fully homomorphic encryption scheme together with its open-source implementation, available on github
Klungre, Vidar. "The Smart-Vercauteren Fully Homomorphic Encryption Scheme." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18696.
Full textDoroz, Yarkin. "New Approaches for Efficient Fully Homomorphic Encryption." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-dissertations/309.
Full textMoore, Ciara Marie. "Accelerating fully homomorphic encryption over the integers." Thesis, Queen's University Belfast, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.695860.
Full textWang, Han. "Homomorphic Encryption on the IoT." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33998.
Full textMéaux, Pierrick. "Hybrid fully homomorphic framework." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE066/document.
Full textFully homomorphic encryption, firstly built in 2009, is a very powerful kind of encryption, allowing to compute any function on encrypted data, and to get an encrypted version of the result. Such encryption enables to securely delegate data to a cloud, ask for computations, recover the result, while keeping private the data during the whole process. However, today’s inefficiency of fully homomorphic encryption, and its inadequateness to the outsourcing computation context, makes its use alone insufficient for this application. Both of these issues can be circumvented, using fully homomorphic encryption in a larger framework, by combining it with a symmetric encryption scheme. This combination gives a hybrid fully homomorphic framework, designed towards efficient outsourcing computation, providing both security and privacy. In this thesis, we contribute to the study of hybridfully homomorphic framework, through the analysis, and the design of symmetric primitives making efficient this hybrid construction. Through the examination of fully homomorphic encryption schemes, we develop tools to efficiently use the homomorphic properties in a more complex framework. By investigating various symmetric encryption schemes, and buildingblocks up to the circuit level, we determine good candidates for a hybrid context. Through evaluating the security of constructions optimizing the homomorphic evaluation, we contribute to a wide study within the cryptographic Boolean functions area. More particularly, we introduce a new family of symmetric encryption schemes, with a new design, adapted to the hybrid fully homomorphic framework. We then investigate its behavior relatively to homomorphic evaluation, and we address the security of such design. Finally, particularities of this family of ciphers motivate specific cryptanalyses, therefore we develop and analyze new cryptographic Boolean criteria
Dong, Jiyang. "Accelerating BGV Scheme of Fully Homomorphic Encryption Using GPUs." Digital WPI, 2016. https://digitalcommons.wpi.edu/etd-theses/1233.
Full textChinthamani, Dwarakanath Nagarjun. "Theoretical and practical contributions to homomorphic encryption." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG103.
Full textIn conventional encryption schemes, the primary aim of the scheme is to ensure confidentiality of the data. Fully Homomorphic Encryption (FHE), a variant first realized by Gentry, is an encryption scheme which also allows for computation over the encrypted data, without ever needing to decrypt it. Using this, any untrusted third party with the relevant key material can perform homomorphic computations, leading to many applications where an untrusted party can still be allowed to compute over encryptions of sensitive data (cloud computing), or where the trust needs to be decentralized (multi-party computation).This thesis consists of two main contributions to Fully Homomorphic Encryption. In the first part, we take an FHE based on Fermat numbers and extend it to work with multi-bit numbers. We also add the ability to homomorphically evaluate small functions, with which we can compute additions and multiplication with only a few bootstrappings, and these can be used as building blocks for larger computations. Some newer results on sub-Gaussian random variables are adapted to give a better error analysis.One of the obstacles in bringing FHE to the mainstream remains its large computational complexity, and optimized architectures to accelerate FHE computations on reconfigurable hardware have been proposed. The second part of our thesis proposes an architecture for the polynomial arithmetic used in FV-like cryptosystems. This can be used to compute the sum and product of ring polynomials, using a pair of NTT algorithms which avoids the use of bit reversal, and subsumes the need for multiplication by weight vectors. For the cost of storing twiddle factors in a ROM, we avoid twiddle updates leading to a much smaller cycle count
Vial, prado Francisco. "Contributions to design and analysis of Fully Homomorphic Encryption schemes." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV107/document.
Full textFully Homomorphic Encryption schemes allow public processing of encrypted data. Since the groundbreaking discovery of the first FHE scheme in 2009 by Craig Gentry, an impressive amount of research has been conducted to improve efficiency, achieve new levels of security, and describe real applications and connections to other areas of cryptography. In this Dissertation, we first give a detailed account on research these past years. Our contributions include a key-recovery attack on the ideal lattices FHE scheme and a new conception of hierarchic encryption, avoiding at some extent betrayal between users while maintaining the flexibility of FHE. We also describe some implementations. This research was done in the Laboratoire de Mathématiques de Versailles, under supervision of Prof. Louis Goubin
Costache, Anamaria. "On the practicality of ring-based fully homomorphic encryption schemes." Thesis, University of Bristol, 2018. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.743059.
Full textHiromasa, Ryo. "Efficient Fully Homomorphic Encryption and Digital Signatures Secure from Standard Assumptions." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225736.
Full textEsperança, Pedro M. "Privacy-preserving statistical and machine learning methods under fully homomorphic encryption." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:a081311c-b25c-462e-a66b-1e4ac4de5fc2.
Full textWang, Wei. "Accelerating Cryptosystems on Hardware Platforms." Digital WPI, 2014. https://digitalcommons.wpi.edu/etd-dissertations/109.
Full textUrban, Antoine. "Efficient delegated secure multiparty computation." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT050.
Full textWith the rise of cloud computing, it has become easier to delegate themanagement and analysis of data to external infrastructures, enabling the combinationof diverse datasets to extract valuable insights. However, ensuring the confidentialityof sensitive data remains a significant challenge. Secure multiparty computation(MPC) addresses this issue by allowing multiple participants to collaborateon computations without revealing their private data. This thesis explores an approachwhere data owners delegate these computations to untrusted servers whilemaintaining security and confidentiality. To achieve this, we rely on fully homomorphicencryption (FHE), which allows computations to be performed directly on encrypteddata. Our contributions include a robust MPC protocol based on FHE and a genericmethod that minimizes communication requirements.These advancements make secure computations more efficient and accessible,even for projects involving a large number of participants
Ricosset, Thomas. "Signature électronique basée sur les réseaux euclidiens et échantillonnage selon une loi normale discrète." Thesis, Toulouse, INPT, 2018. http://www.theses.fr/2018INPT0106/document.
Full textLattice-based cryptography has generated considerable interest in the last two decades due toattractive features, including conjectured security against quantum attacks, strong securityguarantees from worst-case hardness assumptions and constructions of fully homomorphicencryption schemes. On the other hand, even though it is a crucial part of many lattice-basedschemes, Gaussian sampling is still lagging and continues to limit the effectiveness of this newcryptography. The first goal of this thesis is to improve the efficiency of Gaussian sampling forlattice-based hash-and-sign signature schemes. We propose a non-centered algorithm, with aflexible time-memory tradeoff, as fast as its centered variant for practicable size of precomputedtables. We also use the Rényi divergence to bound the precision requirement to the standarddouble precision. Our second objective is to construct Falcon, a new hash-and-sign signaturescheme, based on the theoretical framework of Gentry, Peikert and Vaikuntanathan for latticebasedsignatures. We instantiate that framework over NTRU lattices with a new trapdoor sampler
Chillotti, Ilaria. "Vers l'efficacité et la sécurité du chiffrement homomorphe et du cloud computing." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLV020.
Full textFully homomorphic encryption is a new branch of cryptology, allowing to perform computations on encrypted data, without having to decrypt them. The main interest of homomorphic encryption schemes is the large number of practical applications for which they can be used. Examples are given by electronic voting, computations on sensitive data, such as medical or financial data, cloud computing, etc..The first fully homomorphic encryption scheme has been proposed in 2009 by Gentry. He introduced a new technique, called bootstrapping, used to reduce the noise in ciphertexts: in fact, in all the proposed homomorphic encryption schemes, the ciphertexts contain a small amount of noise, which is necessary for security reasons. If we perform computations on noisy ciphertexts, the noise increases and, after a certain number of operations, the noise becomes to large and it could compromise the correctness of the final result, if not controlled.Bootstrapping is then fundamental to construct fully homomorphic encryption schemes, but it is very costly in terms of both memory and time consuming.After Gentry’s breakthrough, the presented schemes had the goal to propose new constructions and to improve bootstrapping, in order to make homomorphic encryption practical. One of the most known schemes is GSW, proposed by Gentry, Sahai et Waters in 2013. The security of GSW is based on the LWE (learning with errors) problem, which is considered hard in practice. The most rapid bootstrapping on a GSW-based scheme has been presented by Ducas and Micciancio in 2015. In this thesis, we propose a new variant of the scheme proposed by Ducas and Micciancio, that we call TFHE.The TFHE scheme improves previous results, by performing a faster bootstrapping (in the range of a few milliseconds) and by using smaller bootstrapping keys, for the same security level. TFHE uses TLWE and TGSW ciphertexts (both scalar and ring): the acceleration of bootstrapping is mainly due to the replacement of the internal GSW product, used in the majority of previous constructions, with an external product between TLWE and TGSW.Two kinds of bootstrapping are presented. The first one, called gate bootstrapping, is performed after the evaluation of a homomorphic gate (binary or Mux); the second one, called circuit bootstrapping, can be executed after the evaluation of a larger number of homomorphic operations, in order to refresh the result or to make it compatible with the following computations.In this thesis, we also propose new techniques to improve homomorphic computations without bootstrapping and new packing techniques. In particular, we present a vertical packing, that can be used to efficiently evaluate look-up tables, we propose an evaluation via weighted deterministic automata, and we present a homomorphic counter, called TBSR, that can be used to evaluate arithmetic functions.During the thesis, the TFHE scheme has been implemented and it is available in open source.The thesis contains also ancillary works. The first one concerns the study of the first model of post-quantum electronic voting based on fully homomorphic encryption, the second one analyzes the security of homomorphic encryption in a practical cloud implementation scenario, and the third one opens up about a different solution for secure computing, multi-party computation
Li, Zhizhou. "Multi-Scheme Fully Homomorphic Encryptions And Its Application In Privacy Preserving Data Mining." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1430760068.
Full textPůlpánová, Veronika. "Homomorphic encryption and coding theory." Master's thesis, 2012. http://www.nusl.cz/ntk/nusl-306513.
Full textWang, Zi-Hao, and 王子豪. "Apply Fully Homomorphic Encryption in a Health Storage System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/5v6e72.
Full text國立中正大學
通訊工程研究所
102
Fully homomorphic encryption is capable to execute specific operations on encrypted data without decrypting it. When we decrypt the result of the operation, it is the same as result of the calculation on the raw data. Therefore, we use the fully homomorphic algorithm to protect the data from leaking out. In this thesis, we use the client / server model to design a health cloud storage system that allows users to store their own health data in this system, and the system ciphertext using these data to do a series of arithmetic operations and the operating result returned to the user.
Chuang, Tsu-Ang, and 莊祖昂. "Realizing Fully Homomorphic Encryption on Wi-Fi Direct Protocol." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/ejpn25.
Full text國立中正大學
通訊工程研究所
102
With the development of technology, the popularity of wireless networks and many wireless applications, there are more and more opportunities to make the device to connect with each other and to exchange information. The Wi-Fi Direct is a new wireless connection technology based on this demand, which enables Wi-Fi devices to connect easily with each other by the peer to peer mode without requiring a wireless access point. However, when we want to send data to other users’ device for data processing and do not want other users to be able to decrypt the data, the traditional Wi-Fi encryption system will be unable to meet our needs. In view of this, we proposed to use fully homomorphic encryption combined with current Wi-Fi encryption system to solve this problem. The concept of homomorphic encryption is when we carry out a specific operation on ciphertext, after decryption, the result is equivalent to the corresponding plaintext. So that we can perform data processing in ciphertext and maintain the correctness of data, and make the devices to pass and process data through Wi-Fi Direct protocol with convenience and security.
Huang, Chung-Ting, and 黃中鼎. "A Cashflow System on Cloud with Fully Homomorphic Encryption." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/f59t2t.
Full text國立中正大學
通訊工程研究所
103
With advances in technological development, as well as the popularity of cloud computing and the Internet, increasing numbers of cloud services have become available. The cash flow system of cloud computing constitutes a new cash flow service based on this large demand, which enables users to transfer funds over the Internet. However, when users want to transfer data to other users’ accounts for processing and do not want the servers to be able to decrypt the data, the traditional cash flow system is inadequate. To solve this problem, we propose to implement fully homomorphic encryption combined with the cash flow system of cloud computing. The concept of homomorphic encryption refers to when we perform a specific operation in ciphertext, the result after decryption is equivalent to the corresponding plaintext. Therefore, utilizing homomorphic encryption allows us to perform data processing in ciphertext, maintain data accuracy, achieve cloud computing, and securely protect the data from decryption.
Jyun-NengJi and 紀鈞能. "Low-Complexity Computations on Encrypted Data for Fully Homomorphic Encryption." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9x2c8d.
Full text國立成功大學
電機工程學系
107
Fully homomorphic encryption (FHE) allows computations to be performed directly on encrypted data. This ensures data privacy even on the cloud. Currently used computations on encrypted data are of extremely high complexity. In this paper, we propose low-complexity low-level operations on fully homomorphic encrypted data such as compare-and-swap, binary addition, and binary multiplication. To improve the algorithmic performance, we apply the concept of aggregate plaintext. The number of homomorphic multiplications in our compare-and-swap, binary addition, and binary multiplication are lg n+4, 2n-1, and 6n-4, respectively. For 64-bit data compare-and-swap and binary addition, the proposed algorithms operate over 16 and 9 times faster than related works, respectively. For 32-bit multiplication, the speed improvement is over 7 times.
Wang, Hsun-Pang, and 王訓邦. "Apply Fully Homomorphic Encryption to Personal Health Records in Telemedicine Systems." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/06903166455090750208.
Full text國立中正大學
通訊工程研究所
104
Nowadays, some applications of telemedicine are transferring users’ personal and health information to cloud server for store via internet. The purpose is to allow demander can obtain users’ information more easily and quickly from a distance. But in fact, the aforementioned operation has security risks about whether these server providers can be fully trusted. In view of this, we propose to use fully homomorphic encryption not only for data encryption to enhance data security in telemedicine system but can allow users to maintain their privacy. At the same time, we can process the ciphertexts directly based on homomorphic property.
Wu, Chung-kai, and 吳崇愷. "Solving the Problem of the GSM One-Way Authentication using Fully Homomorphic Encryption and Efficiency Analysis." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/a59usx.
Full text國立中正大學
通訊工程研究所
103
Gentry proposed the first practical scheme which can compute arbitrary functions of encrypted data in 2009. This scheme is named “Fully Homomorphic Encryption (FHE).” FHE allows us to compute more than two specific calculations without the secret decryption key. FHE can deal with and protect large amount of private data and can be widely used in cloud database application or data storage application. However, the GSM encryption system uses one-way authentication, SIM card will use secret key (ki) and random number (RAND) to produce a “signal response (SRES)” and send to the authentication center. At the same time, authentication center also uses ki and RAND to produce an SRES and compares two SRESs. If two SRESs are the same, authentication will succeed. If the authentication center is fake, the user can not recognize when the authentication center requests the user to send the SRES. In this thesis, we address the problem above and provide an encryption algorithm efficiency analysis. As a result, our scheme which is combined with fully homomorphic encryption is more secure and practical.
Chen, Pin-Chun, and 陳品君. "A Study of the Applicability of Ideal Lattice-Based Fully Homomorphic Encryption Scheme to Ethereum Blockchain." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/74baqx.
Full text國立臺灣大學
資訊網路與多媒體研究所
107
Without the requirement of trusted third-parties, Blockchain guarantees an environment which can be trusted to everyone. However, the transparency property caused a hazard to real-world application that every on-chain information can be viewed by every user. That is to say, the application which contains sensitive data and personal information which require privacy protection cannot be implemented into Blockchain. We propose Fully Homomorphic Encryption scheme into Blockchain, combining the trusty and privacy protection, build up a new framework to obtain both of the advantages and make the Blockchain applications easier to enforce privacy protection based on our system. Our framework’s programmer can encrypt the private data off-chain by FHE scheme, sequentially, they can call FHE function to compute their data after their smart contracts deploy to Blockchain. To present the advantages and the weakness of our framework, we then design a Vickrey Auction System using our FHE-based system to make the bidding price in secret while output the winner and his/her required payment.
Ricosset, Thomas. "Lattice-based digital signature and discrete gaussian sampling." Phd thesis, 2018. http://oatao.univ-toulouse.fr/23886/1/ricosset.pdf.
Full text