https://github.com/zama-ai/fhevm/blob/main/fhevm-whitepaper-v2.pdf (propose a solution combining fhe for confidential computation, threshold mpc protocols for fhe key generation and ciphertexts decryption, and zk proofs of knowledge to ensure correctness and integrity of encrypted inputs)

This commit is contained in:
autistic-sage 2024-12-10 15:42:01 -08:00
parent 0b2fd5eb3d
commit 024722a9bb
2 changed files with 4 additions and 3 deletions

View File

@ -6,5 +6,5 @@
* ⬛️ **[zero-knowledge systems](zero_knowledge)** * ⬛️ **[zero-knowledge systems](zero_knowledge)**
* ⬛️ **[trusted execution environments](trusted_execution_environments)** * ⬛️ **[trusted execution environments](trusted_execution_environments)**
* ⬛️ **[multi-party computation](multi_party_computation)** * ⬛️ **[multi-party computation](multi_party_computation)**
* ⬛️ **[(full) homomorphic encryption](homomorphic_encryption)** * ⬛️ **[(fully) homomorphic encryption](homomorphic_encryption)**
* ⬛️ **[wallets and identity](wallets_and_identity)** * ⬛️ **[wallets and identity](wallets_and_identity)**

View File

@ -1,4 +1,4 @@
## (full) homomorphic encryption ## (fully) homomorphic encryption
<br> <br>
@ -8,8 +8,9 @@
#### cool readings #### cool readings
* **[a fully homomorphic encryption scheme, by c. gentry (2009)](https://crypto.stanford.edu/craig/craig-thesis.pdf)** * **[confidential evm smart contracts with fhe, by zama (2024)](https://github.com/zama-ai/fhevm/blob/main/fhevm-whitepaper-v2.pdf)** (propose a solution combining fhe for confidential computation, threshold mpc protocols for fhe key generation and ciphertexts decryption, and zk proofs of knowledge to ensure correctness and integrity of encrypted inputs)
* **[combining machine learning and homomorphic encryption in the apple ecosystem (2024)](https://machinelearning.apple.com/research/homomorphic-encryption)** * **[combining machine learning and homomorphic encryption in the apple ecosystem (2024)](https://machinelearning.apple.com/research/homomorphic-encryption)**
* **[a fully homomorphic encryption scheme, by c. gentry (2009)](https://crypto.stanford.edu/craig/craig-thesis.pdf)**
<br> <br>