PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4

PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceProxy Re-encryption (PRE) using CKKS Homomorphic EncryptionWe live in a legal world of proxies. When you purchase a house, you will use a trusted solicitor to act on your behalf. So, if Alice is…19h ago19h ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSerialization of Homomorphic Encryption ElementsIn any program, we can have data objects and which are represented in a binary format. These reside in memory. But what if we need to send…1d ago11d ago1

Prof Bill Buchanan OBE FRSELogistic Function In Homomorphic Encryption — A Base for Privacy-Award Machine LearningWe live in a world where AI can harvest citizen data. But can we find a way that we can learn on encrypted data? Well, with homomorphic…2d ago2d ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceApproximating Functions Using Polynomials: Chebyshev Approximation in Homomorphic EncryptionLike it or not, we are moving to a foundation of cybersecurity which moves us away from our traditional public key methods into a world…3d ago3d ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHomomorphic Encryption With CKKS and BFV For The Inner Product of Two VectorsEncryption is one of the weakest implementations within cybersecurity, and where data which is not encrypted can be exposed to data…6d ago6d ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHomomorphic 4-bit Adder Cipher CircuitWe give away data when it runs in memory as the bits on a circuit can be examined. But, let’s say we encrypt the bits before we apply them…Jul 30Jul 30

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHow Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?The millionaire’s problem has been known for decades, and when two millionaires meet and want to know who has the most money but don’t want…Jul 30Jul 30

Prof Bill Buchanan OBE FRSEBoolean Cipher Circuits Using Fully Homomorphic Encryption and OpenFHEDM (FHEW) [1] uses a LWE (Learning With Error) method that provides fully homomorphic encryption (FHE). It is able to evaluate cipher data…Jul 30Jul 30