Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. [PDF]
Hamza R +6 more
europepmc +1 more source
A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach. [PDF]
Vanin FNDS +6 more
europepmc +1 more source
SYSTEMATIZATION AND ANALYSIS OF PARTIALLY AND FULLY HOMOMORPHIC CRYPTOSYSTEM
In this article provides an overview of the known partially and fully homomorphic cryptosystem, such as: RSA, ElGamal, Paillier, Gentry and Halevi. Justified the homomorphic properties of the considered cryptosystems.
A. V. Epishkina, A. N. Gerasimov
doaj
Efficient identity-based fully homomorphic encryption over NTRU
Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an ...
Ran DUAN +4 more
doaj +2 more sources
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
An efficient implementation scheme for the BFV fully homomorphic encryption algorithm was proposed on the Zynq platform. This scheme effectively integrated the negative wrapped convolution with the number theoretic transform (NTT) algorithm, optimizing ...
YANG Yatao +3 more
doaj +2 more sources
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and has many applications. However, its practical implementation faces massive computation and memory overheads.
Aikata Aikata +4 more
doaj +1 more source
Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption. [PDF]
Carpov S +3 more
europepmc +1 more source
On Fully Homomorphic Encryption
Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and perform arbitrary operations on this data efficiently.The data remains encrypted throughout, but the operations can be done regardless, without having to know the decryption key.Such a scheme would be very advantageous, for example in ensuring the privacy ...
openaire +1 more source
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate, a verifiable identity-based multi-user homomorphic proxy re-
HOU Jinqiu +3 more
doaj
Pair-wise key establishment for wireless sensor networks based on fully homomorphic encryption
An attack on the permutation-based multi-polynomial scheme exposed in the paper of Guo was proposed.The scheme couldn’t frustrate the large-scale node capture attack was proved.A pair-wise key establishment scheme was proposed by introducing homomorphic ...
Yong ZHANG +3 more
doaj

