Palisade

Jul 20, 2023

PALISADE lattice cryptography library for Fully Homomorphic Encryption

PALISADE is a general lattice cryptography library that currently includes efficient implementations of the following lattice cryptography capabilities

  • Fully Homomorphic Encryption FHE
  • Brakerski/Fan-Vercauteren BFV scheme for integer arithmetic
  • Brakerski-Gentry-Vaikuntanathan BGV scheme for integer arithmetic
  • Cheon-Kim-Kim-Song CKKS scheme for real-number arithmetic
  • Ducas-Micciancio FHEW and Chillotti-Gama-Georgieva-Izabachene TFHE schemes for Boolean circuit evaluation
  • Stehle-Steinfeld scheme for limited integer arithmetic
  • Multi-Party Extensions of FHE to support multi-key FHE
  • Threshold FHE for BGV, BFV, and CKKS schemes
  • Proxy Re-Encryption for BGV, BFV, and CKKS schemes
  • Digital Signature
  • Identity-Based Encryption
  • Ciphertext-Policy Attribute-Based Encryption

PALISADE is in the maintenance-only mode, and no new features will be added. Please use security/openfhe for new development. Existing projects should consider switching to security/openfhe. PALISADE will be deprecated in the future in favor of security/openfhe.



Checkout these related ports:
  • Zzuf - Transparent application input fuzzer
  • Zlint - X.509 certificate linter
  • Zeronet - Decentralized websites using Bitcoin crypto and BitTorrent network
  • Zenmap - GUI frontend for the Nmap scanning utility
  • Zeek - System for detecting network intruders in real-time
  • Zaproxy - The OWASP zed attack proxy
  • Yubioath-desktop - GUI for displaying OATH codes with a Yubikey
  • Yubikey-personalization-gui - Graphical YubiKey personalization tool
  • Yubikey-manager-qt - Cross-platform application for configuring any YubiKey
  • Yubikey-agent - Seamless ssh-agent for YubiKeys
  • Yubico-piv-tool - Yubico PIV tool
  • Ylva - Command line password manager and file encryption program
  • Ykpers - Library and tool for personalization of Yubico's YubiKey
  • Ykclient - Yubico C client library
  • Yersinia - Layer 2 vulnerability scanner (switches, spanning tree, 802.1q ...)