Results 11 to 20 of about 1,105 (119)
Homomorphic encryption (HE) is notable for enabling computation on encrypted data as well as guaranteeing high‐level security based on the hardness of the lattice problem. In this sense, the advantage of HE has facilitated research that can perform data analysis in an encrypted state as a purpose of achieving security and privacy for both clients and ...
Joon Soo Yoo, Ji Won Yoon, Junggab Son
wiley +1 more source
To help smartphone users protect their phone, fingerprint‐based authentication systems (e.g., Apple’s Touch ID) have increasingly become popular in smartphones. In web applications, however, fingerprint‐based authentication is still rarely used. One of the most serious concerns is the lack of technology for securely storing fingerprint data used for ...
Taeyun Kim +3 more
wiley +1 more source
SecureBP from Homomorphic Encryption
We present a secure backpropagation neural network training model (SecureBP), which allows a neural network to be trained while retaining the confidentiality of the training data, based on the homomorphic encryption scheme. We make two contributions.
Qinju Liu +6 more
wiley +1 more source
Curtis\u27s botanical magazine. [PDF]
v.31-32=no.1237-1328 ...
Bentham-Moxon Trust. +10 more
core +13 more sources
Qudit Colour Codes and Gauge Colour Codes in All Spatial Dimensions [PDF]
Two-level quantum systems, qubits, are not the only basis for quantum computation. Advantages exist in using qudits, d-level quantum systems, as the basic carrier of quantum information. We show that color codes, a class of topological quantum codes with
Anwar, Hussain +3 more
core +3 more sources
Homomorphic encryption (HE) is considered as one of the most powerful solutions to securely protect clients’ data from malicious users and even severs in the cloud computing. However, though it is known that HE can protect the data in theory, it has not been well utilized because many operations of HE are too slow, especially multiplication.
Baek Kyung Song +4 more
wiley +1 more source
NFLlib: NTT-based Fast Lattice Library [PDF]
International audienceRecent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alternative to classical ...
Aguilar Melchor, Carlos +5 more
core +4 more sources
Analysis on Matrix GSW‐FHE and Optimizing Bootstrapping
With the rapid development of multimedia technologies, the multimedia data storage and outsource computation are delegated to the untrusted cloud, which has led to a series of challenging security and privacy threats. Fully homomorphic encryption can be used to protect the privacy of cloud data and solve the trust problem of third party. In this paper,
Xiufeng Zhao +5 more
wiley +1 more source
Adaptive optimization for OpenCL programs on embedded heterogeneous systems [PDF]
Heterogeneous multi-core architectures consisting of CPUs and GPUs are commonplace in today’s embedded systems. These architectures offer potential for energy efficient computing if the application task is mapped to the right core.
Cho Y., Garzón E., Grewe D., Imes C.
core +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source

