Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
… in an MPC … of ciphers in the context of MPC, ZK, or FHE schemes where linear parts are
much cheaper than non-linear parts. This cost metric suggests a new way of designing a cipher

Secure and efficient transciphering for FHE-based MPC

DF Aranha, A Guimarães, C Hoffmann… - Cryptology ePrint …, 2024 - eprint.iacr.org
… RKA-security in transciphering and Margrethe The core of our proposal is simply to employ
a stream cipher that is resistant against RKA for the specific MPC setting we consider (two-…

Chaghri-a FHE-friendly block cipher

T Ashur, M Mahzoun, D Toprakhisar - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
… to be efficient in ZK and MPC applications. Although numerous … ciphers were proposed for
ZK and MPC applications, there are not many algebraic ciphers proposed in the context of FHE

Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly -Based Ciphers

Z Xu, S Chen, M Wang, P Wei - Australasian Conference on Information …, 2023 - Springer
… This is because these MPC/FHE/ZK systems can be … attention for these MPC/FHE/ZK-friendly
ciphers, only several of … [16] for lightweight block ciphers. Besides linear cryptanalysis …

Between a Rock and a Hard Place: Interpolating between MPC and FHE

A Choudhury, J Loftus, E Orsini, A Patra… - … conference on the theory …, 2013 - Springer
… Thus the protocol in this paper may provide a practical tradeoff between existing MPC
protocols (which consume high bandwidth) and FHE based protocols (which require huge …

MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

M Albrecht, L Grassi, C Rechberger, A Roy… - … Conference on the …, 2016 - Springer
… Examples include MPC protocols based on Yao’s garbled … construction for a secure block
cipher or a secure cryptographic … LowMC is a block cipher designed for MPC/FHE applications …

Practical mpc+ fhe with applications in secure multi-partyneural network evaluation

R Zhu, C Ding, Y Huang - Cryptology ePrint Archive, 2020 - eprint.iacr.org
FHE (thereby MPC schemes) through tailoring generic MPC protocols to the base FHE scheme
while requiring no effort in FHE … representative Ring-LWE-based FHE schemes: CKKS [37…

MPC-friendly symmetric key primitives

L Grassi, C Rechberger, D Rotaru, P Scholl… - Proceedings of the …, 2016 - dl.acm.org
… This is to enable a comparison with our Fp based block ciphers against not only a
standard in-use block cipher (AES), but also a block cipher designed for use in MPC/FHE

Towards stream ciphers for efficient FHE with low-noise ciphertexts

P Méaux, A Journault, FX Standaert… - Advances in Cryptology …, 2016 - Springer
cipher, for which we provide a preliminary security analysis. We finally highlight the good
properties of our stream cipher … delegation (for 2nd-generation FHE schemes). We conclude the …

[PDF][PDF] Multiparty homomorphic encryption: From theory to practice

CV Mouchet - 2023 - infoscience.epfl.ch
… , one of the most successful FHE libraries available today. … MPC protocols, commonly referred
to as two-round MPC: In … is homomorphically evaluated over the ciphertexts, either by the …