Nicholas Genise
YOU?
Author Swipe
View article: HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security Open
We construct an efficient proxy re-encryption (PRE) scheme secure against honest re-encryption attacks (HRA-secure) with precise concrete security estimates. To get these precise concrete security estimates, we introduce the tight, fine-gr…
View article: Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption
Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption Open
Real-world healthcare data sharing is instrumental in constructing broader-based and larger clinical datasets that may improve clinical decision-making research and outcomes. Stakeholders are frequently reluctant to share their data withou…
View article: OpenFHE
OpenFHE Open
International audience
View article: CraterLake
CraterLake Open
Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due to its prohibitive overheads, about 10,000X over unencryp…
View article: Quantum Optimization Heuristics with an Application to Knapsack Problems
Quantum Optimization Heuristics with an Application to Knapsack Problems Open
This paper introduces two techniques that make the standard Quantum Approximate Optimization Algorithm (QAOA) more suitable for constrained optimization problems. The first technique describes how to use the outcome of a prior greedy class…
View article: F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version)
F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version) Open
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted serves. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude…
View article: Gadgets and Gaussians in Lattice-Based Cryptography
Gadgets and Gaussians in Lattice-Based Cryptography Open
This dissertation explores optimal algorithms employed in lattice-based cryptographic schemes. Chapter 2 focuses on optimizing discrete gaussian sampling on "gadget" and algebraic lattices. These gaussian sampling algorithms are used in la…