Results 141 to 150 of about 1,678 (176)
Some of the next articles are maybe not open access.
Parallelizing Fully Homomorphic Encryption
2014 International Symposium on Computer, Consumer and Control, 2014As cloud computing has grown increasingly prevalent, the privacy of data on the cloud becomes an issue. Encryption is an effective way to enforce data privacy. However most of existing encryption schemes require data to be decrypted for computations where data becomes vulnerable for data intrusion.
Ryan Hayward, Chia Chu Chiang
openaire +1 more source
2014
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire +1 more source
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire +1 more source
A Flexible Fully Homomorphic Encryption
Wireless Personal Communications, 2016In view of research on fully homomorphic encryption scheme proposed by Zvika Brakerski in 2012, we find it is not much efficient, because it requests that $$q/B \ge (O(nlogq))^{L+O(1)}$$ , and can encrypt ...
Chunguang Ma, Juyan Li, Gang Du
openaire +1 more source
Verifiable Fully Homomorphic Encryption scheme
2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other parameters are based on concrete Fully Homomorphic Encryption scheme.
Fangyuan Jin, Yanqin Zhu, Xizhao Luo
openaire +1 more source
Fully Homomorphic Encryption Without Noise
International Journal of Smart Security Technologies, 2019In this paper, the authors present a novel fully homomorphic encryption scheme operating between and capable of arbitrarily performing additions and multiplications. The new scheme is compact and each operation (addition or multiplication) performed on any two ciphertexts produces a fresh ciphertext without any associated noise. Thus, the scheme does
Yacine Ichibane +3 more
openaire +1 more source
HECO: Fully Homomorphic Encryption Compiler
2023In recent years, Fully Homomorphic Encryption (FHE) has undergone several breakthroughs and advancements leading to a leap in performance. Today, performance is no longer a major barrier to adoption. Instead, it is the complexity of developing an efficient FHE application that currently limits deploying FHE in practice and at scale.
Viand, Alexander; id_orcid0000-0001-5452-1432 +3 more
openaire +1 more source
Fully-Homomorphic Encryption Based SPIR
2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011The booming of the Internet and its applications, especially, the recent trend in outsourcing databases, fuels the research on symmetrically private information retrieval (SPIR) schemes. In this paper, we propose a fully homomorphic encryption based SPIR scheme in order to further improve the comm-unication cost of SPIR from O((logn)²) to O(logn ...
Hong Zhong +4 more
openaire +1 more source
Optimizations in Fully Homomorphic Encryption
2018Optimizations in fully homomorphic encryption are the guidelines of many cryptographic researches after Gentry’s breakthrough in 2009. In this chapter, we sketch different technics to optimize and simplify fully homomorphic encryption schemes. Among these technics, we will focus on the trans-ciphering one, for this method we will describe a homomorphic
Ahmed El-Yahyaoui +1 more
openaire +1 more source
KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
JP Journal of Algebra, Number Theory and Applications, 2022Habri, Hakim +2 more
openaire +2 more sources

