Skip to content

Commit

Permalink
Update publications.rst
Browse files Browse the repository at this point in the history
  • Loading branch information
yspolyakov authored Dec 23, 2022
1 parent 60bb9d7 commit 2fee782
Showing 1 changed file with 47 additions and 46 deletions.
93 changes: 47 additions & 46 deletions docs/sphinx_rsts/misc/publications.rst
Original file line number Diff line number Diff line change
@@ -1,88 +1,89 @@
Selected Publications on Lattice Crypto Scheme Implementations in OpenFHE
Publications on Lattice Crypto Scheme Implementations in OpenFHE
=================================================================

Homomorphic Encryption
----------------------

- Liu, Z., Micciancio, D., and Polyakov, Y., “Large-Precision Homomorphic Sign
Evaluation using FHEW/TFHE Bootstrapping€�, ASIACRYPT 2022 [https://eprint.iacr.org/2021/1337].
- Liu, Z., Micciancio, D., and Polyakov, Y., “Large-Precision
Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping”,
ASIACRYPT 2022 [https://eprint.iacr.org/2021/1337].

- Kim, A., Papadimitriou, A., and Polyakov, Y., “Approximate
Homomorphic Encryption with Reduced Approximation Error”,
CT-RSA 2022 [https://eprint.iacr.org/2020/1118].

- Kim, A., Papadimitriou, A., and Polyakov, Y., “Approximate
Homomorphic Encryption with Reduced Approximation Error�, CT-RSA 2022
[https://eprint.iacr.org/2020/1118].

- Kim, A., Polyakov, Y., and Zucca, V., “Revisiting Homomorphic
Encryption Schemes for Finite Fields�, ASIACRYPT 2021
- Kim, A., Polyakov, Y., and Zucca, V., “Revisiting Homomorphic
Encryption Schemes for Finite Fields”, ASIACRYPT 2021
[https://eprint.iacr.org/2021/204].

- Micciancio, D. and Polyakov, Y., “Bootstrapping in FHEW-like
Cryptosystems�, WAHC 2021 – 9th Workshop on Encrypted Computing &
- Micciancio, D. and Polyakov, Y., “Bootstrapping in FHEW-like
Cryptosystems”, WAHC 2021 9th Workshop on Encrypted Computing &
Applied Homomorphic Cryptography [https://eprint.iacr.org/2020/086].

- Al Badawi, A., Polyakov, Y., Mi Mi Aung, K., Veeravalli, B., and
Rohloff, K., “Implementation and Performance Evaluation of RNS
Variants of the BFV Homomorphic Encryption Scheme�, IEEE Transactions
Rohloff, K., “Implementation and Performance Evaluation of RNS
Variants of the BFV Homomorphic Encryption Scheme”, IEEE Transactions
on Emerging Topics in Computing (IEEE TETC), 2021, Vol. 9, No. 2., pp. 941-956
[https://eprint.iacr.org/2018/589].

- Blatt, M., Gusev, A., Polyakov, Y., Rohloff, K., and Vaikuntanathan,
V., “Optimized Homomorphic Encryption Solution for Secure Genome-Wide
Association Studies�, BMC Medical Genomics, 2020, Vol. 13, Suppl. 7, No. 83
V., “Optimized Homomorphic Encryption Solution for Secure Genome-Wide
Association Studies”, BMC Medical Genomics, 2020, Vol. 13, Suppl. 7, No. 83
[https://eprint.iacr.org/2019/223].

- Halevi, S., Polyakov, Y., and Shoup, V., “An Improved RNS Variant of
the BFV Homomorphic Encryption Scheme�, CT-RSA 2019, pp. 83-105
- Halevi, S., Polyakov, Y., and Shoup, V., “An Improved RNS Variant of
the BFV Homomorphic Encryption Scheme”, CT-RSA 2019, pp. 83-105
[https://eprint.iacr.org/2018/117].

- Archer, D., Calderon Trilla, J.M., Dagit, J., Malozemoff, A.,
Polyakov, Y., Rohloff, K., Ryan, G., “RAMPARTS: A Programmer-Friendly
System for Building Homomorphic Encryption Applications�, WAHC’19
Polyakov, Y., Rohloff, K., Ryan, G., “RAMPARTS: A Programmer-Friendly
System for Building Homomorphic Encryption Applications”, WAHC’19
Proceedings of the 7th Workshop on Encrypted Computing & Applied
Homomorphic Cryptography, pp. 57-68
Homomorphic Cryptography, pp. 57-68
[https://eprint.iacr.org/2019/988].

- Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J.
Malozemoff, Yuriy Polyakov, Sergiu Carpov, “Building Applications
with Homomorphic Encryption�, ACM CCS 2018, pp. 2160-2162.
Malozemoff, Yuriy Polyakov, Sergiu Carpov, “Building Applications
with Homomorphic Encryption”, ACM CCS 2018, pp. 2160-2162.

Proxy Re-Encryption
-------------------

- Polyakov, Y., Rohloff, K., Sahu, G., and Vaikuntanathan, V., “Fast
Proxy Re-Encryption for Publish/Subscribe Systems�, ACM Transactions
on Privacy and Security (ACM TOPS), 2017, Vol. 20, No. 4,
pp. 14:1-14:34 [http://eprint.iacr.org/2017/410].
- Polyakov, Y., Rohloff, K., Sahu, G., and Vaikuntanathan, V., “Fast
Proxy Re-Encryption for Publish/Subscribe Systems”, ACM Transactions
on Privacy and Security (ACM TOPS), 2017, Vol. 20, No. 4,
pp. 14:1-14:34 [http://eprint.iacr.org/2017/410].

Schemes Based on Lattice Trapdoors (Signature, IBE, ABE, Obfuscation)
---------------------------------------------------------------------

- Cheng, C., Genise, N., Micciancio, D., Polyakov, Y., and Rohloff, K.,
“Implementing Token-Based Obfuscation under (Ring) LWE�,
“Implementing Token-Based Obfuscation under (Ring) LWE”,
[https://eprint.iacr.org/2018/1222].

- Genise, N., Micciancio, D., and Polyakov, Y., “Building an Efficient
Lattice Gadget Toolkit: Subgaussian Sampling and More�, EUROCRYPT
2019, pp. 655-684 [https://eprint.iacr.org/2018/946].
- Genise, N., Micciancio, D., and Polyakov, Y., “Building an Efficient
Lattice Gadget Toolkit: Subgaussian Sampling and More”, EUROCRYPT
2019, pp. 655-684 [https://eprint.iacr.org/2018/946].

- Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., Sajjadpour, H.,
and Savaş, E., “Practical Applications of Improved Gaussian Sampling
for Trapdoor Lattices�, IEEE Transactions on Computers (IEEE TC),
2019, Vol. 68, No. 4, pp. 570 - 584
- Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., Sajjadpour, H.,
and Savaş, E., “Practical Applications of Improved Gaussian Sampling
for Trapdoor Lattices”, IEEE Transactions on Computers (IEEE TC),
2019, Vol. 68, No. 4, pp. 570 - 584
[https://eprint.iacr.org/2017/1254].

- Cousins, D. B., Di Crescenzo, G., Gür, K. D., King, K., Polyakov, Y.,
Rohloff, R., Ryan, G. W., and Savaş, E., “Implementing Conjunction
Obfuscation under Entropic Ring LWE�, 2018 IEEE Symposium on Security
and Privacy (SP), pp. 354-371 [https://eprint.iacr.org/2017/844].
- Cousins, D. B., Di Crescenzo, G., Gür, K. D., King, K., Polyakov, Y.,
Rohloff, R., Ryan, G. W., and Savaş, E., “Implementing Conjunction
Obfuscation under Entropic Ring LWE”, 2018 IEEE Symposium on Security
and Privacy (SP), pp. 354-371 [https://eprint.iacr.org/2017/844].

- Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş,
E., and Sunar, B., “Implementation and Evaluation of a Lattice-Based
Key-Policy ABE Scheme�, IEEE Transactions on Information Forensics
and Security (IEEE TIFS), 2018, Vol. 13, No. 5, pp. 1169-1184
- Dai, W., Doröz, Y., Polyakov, Y., Rohloff, K., Sajjadpour, H., Savaş,
E., and Sunar, B., “Implementation and Evaluation of a Lattice-Based
Key-Policy ABE Scheme”, IEEE Transactions on Information Forensics
and Security (IEEE TIFS), 2018, Vol. 13, No. 5, pp. 1169-1184
[http://eprint.iacr.org/2017/601].

- Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., and Savaş, E.,
“Implementation and Evaluation of Improved Gaussian Sampling for
Lattice Trapdoors�, WAHC’18 Proceedings of the 6th Workshop on
- Gür, K. D., Polyakov, Y., Rohloff, K., Ryan, G. W., and Savaş, E.,
“Implementation and Evaluation of Improved Gaussian Sampling for
Lattice Trapdoors”, WAHC’18 Proceedings of the 6th Workshop on
Encrypted Computing & Applied Homomorphic Cryptography,
pp. 61-71[http://eprint.iacr.org/2017/285].
pp. 61-71[http://eprint.iacr.org/2017/285].

0 comments on commit 2fee782

Please sign in to comment.