Results 141 to 150 of about 1,678 (176)
Some of the next articles are maybe not open access.

Parallelizing Fully Homomorphic Encryption

2014 International Symposium on Computer, Consumer and Control, 2014
As cloud computing has grown increasingly prevalent, the privacy of data on the cloud becomes an issue. Encryption is an effective way to enforce data privacy. However most of existing encryption schemes require data to be decrypted for computations where data becomes vulnerable for data intrusion.
Ryan Hayward, Chia Chu Chiang
openaire   +1 more source

Fully Homomorphic Encryption

2014
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire   +1 more source

A Flexible Fully Homomorphic Encryption

Wireless Personal Communications, 2016
In view of research on fully homomorphic encryption scheme proposed by Zvika Brakerski in 2012, we find it is not much efficient, because it requests that $$q/B \ge (O(nlogq))^{L+O(1)}$$ , and can encrypt ...
Chunguang Ma, Juyan Li, Gang Du
openaire   +1 more source

Verifiable Fully Homomorphic Encryption scheme

2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other parameters are based on concrete Fully Homomorphic Encryption scheme.
Fangyuan Jin, Yanqin Zhu, Xizhao Luo
openaire   +1 more source

Fully Homomorphic Encryption Without Noise

International Journal of Smart Security Technologies, 2019
In this paper, the authors present a novel fully homomorphic encryption scheme operating between and capable of arbitrarily performing additions and multiplications. The new scheme is compact and each operation (addition or multiplication) performed on any two ciphertexts produces a fresh ciphertext without any associated noise. Thus, the scheme does
Yacine Ichibane   +3 more
openaire   +1 more source

HECO: Fully Homomorphic Encryption Compiler

2023
In recent years, Fully Homomorphic Encryption (FHE) has undergone several breakthroughs and advancements leading to a leap in performance. Today, performance is no longer a major barrier to adoption. Instead, it is the complexity of developing an efficient FHE application that currently limits deploying FHE in practice and at scale.
Viand, Alexander; id_orcid0000-0001-5452-1432   +3 more
openaire   +1 more source

Fully-Homomorphic Encryption Based SPIR

2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011
The booming of the Internet and its applications, especially, the recent trend in outsourcing databases, fuels the research on symmetrically private information retrieval (SPIR) schemes. In this paper, we propose a fully homomorphic encryption based SPIR scheme in order to further improve the comm-unication cost of SPIR from O((logn)²) to O(logn ...
Hong Zhong   +4 more
openaire   +1 more source

Optimizations in Fully Homomorphic Encryption

2018
Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry’s breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic
Ahmed El-Yahyaoui   +1 more
openaire   +1 more source

KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION

JP Journal of Algebra, Number Theory and Applications, 2022
Habri, Hakim   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy