2,400 research outputs found
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among
the peers involved in exchanging an encrypted message. However, this approach
poses privacy concerns. Especially with popular cloud services, the control
over the privacy of the sensitive data is lost. Even when the keys are not
shared, the encrypted material is shared with a third party that does not
necessarily need to access the content. Moreover, untrusted servers, providers,
and cloud operators can keep identifying elements of users long after users end
the relationship with the services. Indeed, Homomorphic Encryption (HE), a
special kind of encryption scheme, can address these concerns as it allows any
third party to operate on the encrypted data without decrypting it in advance.
Although this extremely useful feature of the HE scheme has been known for over
30 years, the first plausible and achievable Fully Homomorphic Encryption (FHE)
scheme, which allows any computable function to perform on the encrypted data,
was introduced by Craig Gentry in 2009. Even though this was a major
achievement, different implementations so far demonstrated that FHE still needs
to be improved significantly to be practical on every platform. First, we
present the basics of HE and the details of the well-known Partially
Homomorphic Encryption (PHE) and Somewhat Homomorphic Encryption (SWHE), which
are important pillars of achieving FHE. Then, the main FHE families, which have
become the base for the other follow-up FHE schemes are presented. Furthermore,
the implementations and recent improvements in Gentry-type FHE schemes are also
surveyed. Finally, further research directions are discussed. This survey is
intended to give a clear knowledge and foundation to researchers and
practitioners interested in knowing, applying, as well as extending the state
of the art HE, PHE, SWHE, and FHE systems.Comment: - Updated. (October 6, 2017) - This paper is an early draft of the
survey that is being submitted to ACM CSUR and has been uploaded to arXiv for
feedback from stakeholder
Encrypted control for networked systems -- An illustrative introduction and current challenges
Cloud computing and distributed computing are becoming ubiquitous in many
modern control systems such as smart grids, building automation, robot swarms
or intelligent transportation systems. Compared to "isolated" control systems,
the advantages of cloud-based and distributed control systems are, in
particular, resource pooling and outsourcing, rapid scalability, and high
performance. However, these capabilities do not come without risks. In fact,
the involved communication and processing of sensitive data via public networks
and on third-party platforms promote, among other cyberthreats, eavesdropping
and manipulation of data. Encrypted control addresses this security gap and
provides confidentiality of the processed data in the entire control loop. This
paper presents a tutorial-style introduction to this young but emerging field
in the framework of secure control for networked dynamical systems.Comment: The paper is a preprint of an accepted paper in the IEEE Control
Systems Magazin
SoK: Fully Homomorphic Encryption Accelerators
Fully Homomorphic Encryption~(FHE) is a key technology enabling
privacy-preserving computing. However, the fundamental challenge of FHE is its
inefficiency, due primarily to the underlying polynomial computations with high
computation complexity and extremely time-consuming ciphertext maintenance
operations. To tackle this challenge, various FHE accelerators have recently
been proposed by both research and industrial communities. This paper takes the
first initiative to conduct a systematic study on the 14 FHE accelerators --
cuHE/cuFHE, nuFHE, HEAT, HEAX, HEXL, HEXL-FPGA, 100, F1, CraterLake,
BTS, ARK, Poseidon, FAB and TensorFHE. We first make our observations on the
evolution trajectory of these existing FHE accelerators to establish a
qualitative connection between them. Then, we perform testbed evaluations of
representative open-source FHE accelerators to provide a quantitative
comparison on them. Finally, with the insights learned from both qualitative
and quantitative studies, we discuss potential directions to inform the future
design and implementation for FHE accelerators
A robust and scalable implementation of the Parks-McClellan algorithm for designing FIR filters
Preliminary version accepted for publicationInternational audienceWith a long history dating back to the beginning of the 1970s, the Parks-McClellan algorithm is probably the most well-known approach for designing finite impulse response filters. Despite being a standard routine in many signal processing packages, it is possible to find practical design specifications where existing codes fail to work. Our goal is twofold. We first examine and present solutions for the practical difficulties related to weighted minimax polynomial approximation problems on multi-interval domains (i.e., the general setting under which the Parks-McClellan algorithm operates). Using these ideas, we then describe a robust implementation of this algorithm. It routinely outperforms existing minimax filter design routines
Moving To A District Balanced Literacy Program: A Change Leadership Plan
Based upon the requirements of the No Child Left Behind mandate, schools that failed to achieve the Annual Yearly Progress (AYP) designation for two consecutive years were required to implement a comprehensive school reform model. This change plan examined the movement from the comprehensive school reform model Success For All (SFA) to a balanced literacy framework within Harmony District 841. The framework advocated for balanced literacy instruction that supported the integration of authentic reading and writing experiences, application of literacy strategies and skills, implementation of a culturally relevant text, focus on professional development for teachers, and provision for effective instructional tools that support and nurture implementation with fidelity
Approaches to teaching through digital reference
As “teaching libraries,” many academic libraries are committed to teaching not only in classrooms but also at the reference desk. As reference has expanded to include digital modes of e-mail and chat, reference librarians are prompted to consider approaches to teaching in these new reference venues in ways that are meaningful to the user. A promising approach to teaching through digital reference is the application of the ACRL Information Literacy Competency Standards. This paper presents some challenges and benefits of teaching via digital reference. Practical methods for promoting self-directed learning by examining online instruction, and suggestions for effectively advancing a pedagogy based on the ACRL Information Literacy Competency Standards, are offered
Understanding Teachers’ Experiences Implementing an Innovative Early Literacy Program
The problem addressed in this study was the lack of effective literacy interventions for the development of reading skills for primary students who are at-risk for dropping out of high school. The purpose of this study was to examine early literacy instruction by exploring the insights and perspectives of primary educators who participated in a literacy intervention program known as the supporting literacy model. The conceptual framework was based on sociocultural learning theory and self-efficacy theory. The main research question for this qualitative multiple case study addressed the experiences of teachers and instructional coaches who implemented the supporting literacy model. Purposive sampling was used to identify 8 educators who taught kindergarten through 2nd grade in the literacy intervention program. Data were collected through semistructured interviews, a reflective journal topic response, and curriculum artifacts. The data were analyzed through thematic inductive analysis using the cross case analysis to identify codes, patterns, and emerging themes that described these educators’ experiences. The results of this study indicated that the teachers were confident in their abilities to implement a differentiated literacy curriculum into their classroom. Additionally, they described intensive, ongoing professional development that supported their work with students and provided them with the skills and knowledge to implement an innovative early literacy program. The implementation of effective early literacy interventions may decrease the risk of high school dropout and support student success beyond graduation
Vision-based Robotic Grasping in Simulation using Deep Reinforcement Learning
This thesis will investigate different robotic manipulation and grasping approaches. It will present an overview of robotic simulation environments, and offer an evaluation of PyBullet, CoppeliaSim, and Gazebo, comparing various features. The thesis further presents a background for current approaches to robotic manipulation and grasping by describing how the robotic movement and grasping can be organized. State-of-the-Art approaches for learning robotic grasping, both using supervised methods and reinforcement learning methods are presented.
Two set of experiments will be conducted in PyBullet, illustrating how Deep Reinforcement Learning methods could be applied to train a 7 degrees of freedom robotic arm to grasp objects
- …