Results 21 to 30 of about 404,295 (388)

Survey on Fully Homomorphic Encryption, Theory, and Applications

open access: yesProceedings of the IEEE, 2022
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks.
Chiara Marcolla   +5 more
semanticscholar   +1 more source

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise

open access: yesIEEE Access, 2018
To protect cyber security and privacy, it is critical to design security and practical public key encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities but also fundamental security challenges.
Zhimin Yu   +4 more
doaj   +1 more source

Attribute-based encryption for fine-grained access control of encrypted data

open access: yesConference on Computer and Communications Security, 2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e ...
Vipul Goyal   +3 more
semanticscholar   +1 more source

Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning

open access: yesFuture Internet, 2021
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated ...
H. Fang, Q. Qian
semanticscholar   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

open access: yesIEEE Access, 2018
Cloud computing and social networks are changing the way of healthcare by providing realtime data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks ...
Qinlong Huang   +3 more
doaj   +1 more source

Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security

open access: yesEdu Komputika Journal, 2023
There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key)
Siti Alvi Sholikhatin   +3 more
doaj   +1 more source

A Survey on Homomorphic Encryption Schemes [PDF]

open access: yesACM Computing Surveys, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Abbas Acar   +3 more
semanticscholar   +1 more source

Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers

open access: yesIEEE Access, 2023
Being the only nonlinear component in many cryptosystems, an S-box is an integral part of modern symmetric ciphering techniques that creates randomness and increases confidentiality at the substitution stage of the encryption.
Muhammad Irfan   +5 more
doaj   +1 more source

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: yesIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy