flowchart BT
A[CORE<br/>- math implementation<br/>- lattice implementation<br/>- serialization] --> B[PKE<br/> -generalized FHE];
A --> C[BINFHE<br/>- binary FHE];
B --> D[Application<br/>- encrypted data analysis<br/>- privacy-compliant data sharing];
C --> D;
- for binary-FHE applications
- underlying implementation providing the base that
binFHE
andpke
are built off of
- for general Homomorphic Encryption applications
Although the OpenFHE team has provided various utility functions to make OpenFHE accessible to non-cryptographers, it is still necessary for the end-users to carefully consider how they are using the code. Improper use can result in leaked information. Use of OpenFHE in production environments should be reviewed by homomorphic encryption experts.