CKKS explained, Part 3: Encryption and Decryption

Third part of the series CKKS explained where we see how to build an HE system from RLWE, implement encryption, decryption, addition and multiplication.

CKKS explained, Part 2: Full Encoding and Decoding

Second part of the series CKKS explained where we see how to implement CKKS encoder and decoder.

CKKS explained: Part 1, Vanilla Encoding and Decoding

First part of the series CKKS explained where we see how to implement a vanilla encoder and decoder.

Privacy-Preserving Data Science, Explained

In this blog series, we’ll explain common topics in privacy-preserving data science, from a single sentence to code examples. We hope these posts serve as a useful resource for you to figure out the best techniques for your organization.

A privacy-preserving way to find the intersection of two datasets

This post is part of our Privacy-Preserving Data Science, Explained series. Private set intersection (PSI) is a powerful cryptographic techn

Build an Homomorphic Encryption Scheme from Scratch with Python

This blog post aims at explaining the basic mathematical concepts behind most of today's homomorphic encryption schemes, and then build upon this to implement our own scheme (similar to BFV) from scratch using Python.

Homomorphic Encryption in PySyft with SEAL and PyTorch

In this post we showcase a new tensor type that leverages the CKKS homomorphic encryption scheme implemented on the SEAL Microsoft library to evaluate tensor operations on encrypted data.