Results 1 to 10 of about 1,678 (176)

An overview of torus fully homomorphic encryption [PDF]

open access: yesInternational Journal of Group Theory, 2023
The homomorphic encryption allows us to operate on encrypted data, making any action less vulnerable to hacking. The implementation of a fully homomorphic cryptosystem has long been impracticable. A breakthrough was achieved only in 2009 thanks to Gentry
Maria Ferrara   +2 more
doaj   +4 more sources

Secure Fully Homomorphic Authenticated Encryption [PDF]

open access: yesIEEE Access, 2021
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj   +3 more sources

Logistic regression over encrypted data from fully homomorphic encryption. [PDF]

open access: yesBMC Med Genomics, 2018
One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic data. More precisely, given a list of approximately 1500 patient records, each with 18 binary features containing information on specific mutations, the idea was for the data holder to encrypt the records ...
Chen H   +6 more
europepmc   +5 more sources

Homomorphic Evaluation Cluster Architecture for Fully Homomorphic Encryption

open access: yesIEEE Open Journal of Circuits and Systems
Fully Homomorphic Encryption (FHE) allows computational processing of encrypted data on cloud servers, providing high security and enabling safe data utilization.
Hanyoung Lee   +2 more
doaj   +2 more sources

Research on privacy information retrieval model based on hybrid homomorphic encryption

open access: yesCybersecurity, 2023
The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low.
Wei-tao Song   +3 more
doaj   +1 more source

SoK: Fully Homomorphic Encryption Compilers [PDF]

open access: yes2021 IEEE Symposium on Security and Privacy (SP), 2021
2021 IEEE Symposium on Security and Privacy (SP)
Viand, Alexander   +2 more
openaire   +4 more sources

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION

open access: yesICTACT Journal on Soft Computing, 2021
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud.
M Yogasini, B N Prathibha
doaj   +1 more source

Fully Homomorphic Encryption

open access: yes, 2022
AbstractIn 1978, Rivest et al. (1978) proposed the concepts of data bank and fully homomorphic encryption. Some individuals and organizations encrypt the original data and store them in the data bank for privacy protection. Data bank is also called data cloud. Therefore, the cloud stores a large amount of original data, which is obviously a huge wealth.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

Multikey Fully Homomorphic Encryption and Applications [PDF]

open access: yesSIAM Journal on Computing, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
López-Alt, Adriana   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy