Homomorphic Encryption References (archived)
Last updated Wednesday 24 June 2025
Homomorphic Encryption Standardization Webpage
Daniele Micciancio's Lattice Cryptography Links
Surveys
Craig Gentry
Computing Arbitrary Functions of Encrypted Data
Vinod Vaikuntanathan
Computing Blindfolded: New Developments in Fully Homomorphic Encryption
Shai Halevi
Homomorphic Encryption
Pre-FHE
Ronald Rivest, Leonard Adleman and Mike Dertouzos
On Data Banks and Privacy Homomorphisms
http://people.csail.mit.edu/rivest/RivestAdlemanDertouzos-OnDataBanksAndPrivacyHomomorphisms.pdf
Shafi Goldwasser and Silvio Micali
Probabilistic Encryption
Taher El Gamal
A Public-key Cryptosystem and a Signature Scheme based on Discrete Logarithms
Pascal Paillier
Public-key Cryptosystems based on Composite Degree Residuosity Classes
Ivan Damgard and Mads Jurik
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
Dan Boneh, Eu Jin Goh and Kobbi Nissim
Evaluating 2-DNF Formulas on Ciphertexts
Craig Gentry, Shai Halevi and Vinod Vaikuntanathan
A Simple BGN-Type Cryptosystem from LWE
https://eprint.iacr.org/2010/182
Note: This cryptosystem was discovered after Gentry's work on FHE, as a first attempt to base FHE on standard assumptions such as learning with errors (LWE).
Gen I
Craig Gentry
A fully homomorphic encryption scheme
Marten van Dijk, Craig Gentry, Shai Halevi and Vinod Vaikuntanathan
Fully Homomorphic Encryption over the Integers
Nigel Smart and Frederik Vercauteren
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
Craig Gentry
Toward basing fully homomorphic encryption on worst-case hardness
http://www.iacr.org/archive/crypto2010/62230116/62230116.pdf
Shai Halevi and Craig Gentry
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
https://eprint.iacr.org/2011/279
Note: I would classify this scheme as "somewhere between" the first and second generations, in the sense that it relies on fewer assumptions than the older schemes, yet it still uses ideal lattices.
Gen II
Key Papers:
Zvika Brakerski and Vinod Vaikuntanathan
Efficient Fully Homomorphic Encryption from (Standard) LWE
Zvika Brakerski, Craig Gentry and Vinod Vaikuntanathan
Fully Homomorphic Encryption without Bootstrapping
Zvika Brakerski
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Craig Gentry, Shai Halevi and Nigel Smart
Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry, Shai Halevi and Nigel Smart
Homomorphic Evaluation of the AES Circuit
Other Works:
Craig Gentry, Shai Halevi, Chris Peikert and Nigel P. Smart
Field Switching in BGV-Style Homomorphic Encryption
Zvika Brakerski, Craig Gentry, and Shai Halevi
Packed Ciphertexts in LWE-Based Homomorphic Encryption
Adriana Lopez-Alt, Eran Tromer and Vinod Vaikuntanathan
Multikey Fully Homomorphic Encryption and On-the-Fly Multiparty Computation
Junfeng Fan and Frederik Vercauteren
Somewhat Practical Fully Homomorphic Encryption
Tancrede Lepoint and Michael Naehrig
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Gen III
Craig Gentry, Amit Sahai and Brent Waters
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Zvika Brakerski and Vinod Vaikuntanathan
Lattice-Based FHE as Secure as PKE
Jacob Alperin-Sheriff and Chris Peikert
Faster Bootstrapping with Polynomial Error
Leo Ducas and Daniele Micciancio
FHEW: Bootstrapping Homomorphic Encryption in less than a second
Ryo Hiromasa, Masayuki Abe and Tatsuaki Okamoto
Packing Messages and Optimizing Bootstrapping in GSW-FHE
Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
Open Source Implementations
Shai Halevi and Victor Shoup
HELib: An Implementation of Homomorphic Encryption
*Algorithms in HELib*<br>
[https://eprint.iacr.org/2014/106](https://eprint.iacr.org/2014/106)<br>
*Bootstrapping for HELib*<br>
[https://eprint.iacr.org/2014/873](https://eprint.iacr.org/2014/873)<br>
Hao Chen, Kim Laine and Rachel Player (Microsoft Research)
SEAL: Simple Encrypted Arithmetic Library
https://www.microsoft.com/en-us/research/project/homomorphic-encryption/
Yuriy Polyakov, Kurt Rohloff
PALISADE
Tancrede Lepoint
NFLLib
Leo Ducas and Daniele Micciancio
FHEW
Wei Dai, Yarkin Doroz and Berk Sunar
cuHE: CUDA Homomorphic Encryption Library
Daniele Micciancio (based on this paper)
SWIFFT
https://github.com/micciancio/SWIFFT
Note: SWIFFT is a lattice cryptography library that implements (for a specific dimension) power-of-2 cyclotomic using NTT and SSE/AVX parallelism optimizations.
Applications
Kristin Lauter, Michael Naehrig and Vinod Vaikuntanathan
Can Homomorphic Encryption be Practical?
Raphael Bost, Shafi Goldwasser, Raluca Ada Popa and Stephen Tu
Machine Learning Classification on Encrypted Data
David Wu and Jacob Haven
Using Homomorphic Encryption for Large-Scale Statistical Analysis
https://crypto.stanford.edu/people/dwu4/papers/FHE-SI_Report.pdf
Multi-Key FHE
Adriana Lopez-Alt, Eran Tromer and Vinod Vaikuntanathan
Multikey Fully Homomorphic Encryption and On-the-Fly Multiparty Computation
Michael Clear and Ciarán McGoldrick
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Pratyay Mukherjee and Daniel Wichs
Two Round Multiparty Computation via Multi-Key FHE
Zvika Brakerski and Renen Perlman
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Chris Peikert and Sina Shiehian
Multi-Key FHE from LWE, Revisited
Yevgeniy Dodis, Shai Halevi, Ron Rothblum and Daniel Wichs
Spooky Encryption and Its Applications
Miscellaneous
Craig Gentry, Shai Halevi and Vinod Vaikuntanathan
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Rafail Ostrovsky, Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
Maliciously Circuit-Private FHE
Leo Ducas and Damien Stehle
Sanitization of FHE Ciphertexts
Florian Bourse, Rafael Del Pino, Michele Minelli and Hoeteck Wee
FHE Circuit Privacy Almost for Free
Ron Rothblum
Homomorphic Encryption: From Private Key to Public Key
Incoming Internal References (0)
Outgoing Internal References (0)
Outgoing Web References (58)
-
omomorphicencryption.org
- Homomorphic Encryption Standardization Webpage
-
cseweb.ucsd.edu/~daniele/LatticeLinks
- Daniele Micciancio's Lattice Cryptography Links
-
cacm.acm.org/magazines/2010/3/76272-computing-arbitrary-functions-of-encrypted-data/abstract
- Communications of the ACM
-
eople.csail.mit.edu/vinodv/FHE/FHE-focs-survey.pdf
- FOCS 2011 Tutorial (link to local copy)
-
aih.github.io/pubs/he-chapter.pdf
- Tutorial on the Foundations of Cryptography, Dedicated to Oded Goldreich (linked from Shai's webpage)
-
eople.csail.mit.edu/rivest/RivestAdlemanDertouzos-OnDataBanksAndPrivacyHomomorphisms.pdf
- http://people.csail.mit.edu/rivest/RivestAdlemanDertouzos-OnDataBanksAndPrivacyHomomorphisms.pdf
-
groups.csail.mit.edu/cis/pubs/shafi/1984-jcss.pdf
- http://groups.csail.mit.edu/cis/pubs/shafi/1984-jcss.pdf
-
link.springer.com/chapter/10.1007/3-540-39568-7_2
- https://link.springer.com/chapter/10.1007/3-540-39568-7\_2
-
link.springer.com/chapter/10.1007/3-540-48910-X_16
- Springer Link
-
www.brics.dk/RS/00/45
- http://www.brics.dk/RS/00/45/
-
crypto.stanford.edu/~dabo/abstracts/2dnf.html
- http://crypto.stanford.edu/~dabo/abstracts/2dnf.html
-
eprint.iacr.org/2010/182
- https://eprint.iacr.org/2010/182
-
crypto.stanford.edu/craig/craig-thesis.pdf
- https://crypto.stanford.edu/craig/craig-thesis.pdf
-
eprint.iacr.org/2009/616
- https://eprint.iacr.org/2009/616
-
eprint.iacr.org/2009/571
- https://eprint.iacr.org/2009/571
-
www.iacr.org/archive/crypto2010/62230116/62230116.pdf
- http://www.iacr.org/archive/crypto2010/62230116/62230116.pdf
-
eprint.iacr.org/2011/279
- https://eprint.iacr.org/2011/279
-
eprint.iacr.org/2011/344
- https://eprint.iacr.org/2011/344
-
eprint.iacr.org/2011/277
- https://eprint.iacr.org/2011/277
-
eprint.iacr.org/2012/078
- https://eprint.iacr.org/2012/078
-
eprint.iacr.org/2011/566
- https://eprint.iacr.org/2011/566
-
eprint.iacr.org/2012/099
- https://eprint.iacr.org/2012/099
-
eprint.iacr.org/2012/240
- http://eprint.iacr.org/2012/240
-
eprint.iacr.org/2012/565
- https://eprint.iacr.org/2012/565
-
eprint.iacr.org/2013/094
- https://eprint.iacr.org/2013/094
-
eprint.iacr.org/2012/144
- https://eprint.iacr.org/2012/144
-
eprint.iacr.org/2014/062
- https://eprint.iacr.org/2014/062
-
eprint.iacr.org/2013/340
- https://eprint.iacr.org/2013/340
-
eprint.iacr.org/2013/541
- https://eprint.iacr.org/2013/541
-
eprint.iacr.org/2014/094
- https://eprint.iacr.org/2014/094
-
eprint.iacr.org/2014/816
- https://eprint.iacr.org/2014/816
-
www.iacr.org/workshops/pkc2015/talks/XI/Hiromasa.pdf
- Talk Slides
-
link.springer.com/chapter/10.1007/978-3-662-46447-2_31
- Springer Link
-
eprint.iacr.org/2016/870
- https://eprint.iacr.org/2016/870
-
github.com/shaih/HElib
- https://github.com/shaih/HElib
-
eprint.iacr.org/2014/106
- https://eprint.iacr.org/2014/106
-
eprint.iacr.org/2014/873
- https://eprint.iacr.org/2014/873
-
www.microsoft.com/en-us/research/project/homomorphic-encryption
- https://www.microsoft.com/en-us/research/project/homomorphic-encryption/
-
alisade-crypto.org
- https://palisade-crypto.org/
-
github.com/quarkslab/NFLlib
- https://github.com/quarkslab/NFLlib
-
github.com/lducas/FHEW
- https://github.com/lducas/FHEW
-
github.com/vernamlab/cuHE
- https://github.com/vernamlab/cuHE
-
link.springer.com/chapter/10.1007%2F978-3-540-71039-4_4
- this paper
-
github.com/micciancio/SWIFFT
- https://github.com/micciancio/SWIFFT
-
eprint.iacr.org/2011/405
- https://eprint.iacr.org/2011/405
-
eprint.iacr.org/2014/331
- https://eprint.iacr.org/2014/331
-
crypto.stanford.edu/people/dwu4/papers/FHE-SI_Report.pdf
- https://crypto.stanford.edu/people/dwu4/papers/FHE-SI\_Report.pdf
-
eprint.iacr.org/2013/094
- https://eprint.iacr.org/2013/094
-
eprint.iacr.org/2014/798
- https://eprint.iacr.org/2014/798
-
eprint.iacr.org/2015/345
- https://eprint.iacr.org/2015/345
-
eprint.iacr.org/2016/339
- https://eprint.iacr.org/2016/339
-
eprint.iacr.org/2016/196
- https://eprint.iacr.org/2016/196
-
eprint.iacr.org/2010/182
- https://eprint.iacr.org/2010/182
-
eprint.iacr.org/2010/145
- https://eprint.iacr.org/2010/145
-
eprint.iacr.org/2013/307
- https://eprint.iacr.org/2013/307
-
eprint.iacr.org/2016/164
- https://eprint.iacr.org/2016/164
-
eprint.iacr.org/2016/381
- https://eprint.iacr.org/2016/381
-
eccc.weizmann.ac.il/report/2010/146
- https://eccc.weizmann.ac.il/report/2010/146/