Results 1 to 10 of about 1,678 (176)
An overview of torus fully homomorphic encryption [PDF]
The homomorphic encryption allows us to operate on encrypted data, making any action less vulnerable to hacking. The implementation of a fully homomorphic cryptosystem has long been impracticable. A breakthrough was achieved only in 2009 thanks to Gentry
Maria Ferrara +2 more
doaj +4 more sources
Secure Fully Homomorphic Authenticated Encryption [PDF]
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj +3 more sources
Logistic regression over encrypted data from fully homomorphic encryption. [PDF]
One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic data. More precisely, given a list of approximately 1500 patient records, each with 18 binary features containing information on specific mutations, the idea was for the data holder to encrypt the records ...
Chen H +6 more
europepmc +5 more sources
Homomorphic Evaluation Cluster Architecture for Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) allows computational processing of encrypted data on cloud servers, providing high security and enabling safe data utilization.
Hanyoung Lee +2 more
doaj +2 more sources
Research on privacy information retrieval model based on hybrid homomorphic encryption
The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low.
Wei-tao Song +3 more
doaj +1 more source
SoK: Fully Homomorphic Encryption Compilers [PDF]
2021 IEEE Symposium on Security and Privacy (SP)
Viand, Alexander +2 more
openaire +4 more sources
NTRU-type fully homomorphic encryption scheme without key switching
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG +2 more
doaj +3 more sources
SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud.
M Yogasini, B N Prathibha
doaj +1 more source
AbstractIn 1978, Rivest et al. (1978) proposed the concepts of data bank and fully homomorphic encryption. Some individuals and organizations encrypt the original data and store them in the data bank for privacy protection. Data bank is also called data cloud. Therefore, the cloud stores a large amount of original data, which is obviously a huge wealth.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire +1 more source
Multikey Fully Homomorphic Encryption and Applications [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
López-Alt, Adriana +2 more
openaire +3 more sources

