flowchart BT
A[CORE<br/>- math implementation<br/>- lattice implementation<br/>- serialization] --> B[PKE<br/> -SIMD FHE];
A --> C[BINFHE<br/>- binary FHE];
B --> D[Application<br/>- encrypted data analysis<br/>- privacy-compliant data sharing];
C --> D;
- Boolean arithmetic, comparisons, and aribtrary function evaluation based on DM and CGGI schemes
- underlying implementation providing the base that
binFHE
andpke
are built off of
- integer and real-number arithmetic based on BGV, BFV, and CKKS schemes
Although the OpenFHE team has provided various utility functions to make OpenFHE accessible to non-cryptographers, it is still necessary for the end-users to carefully consider how they are using the code. Improper use can result in leaked information. Use of OpenFHE in production environments should be reviewed by homomorphic encryption experts.
Additionally, see our Security Considerations for considerations that should be taken into account in your work.