Results 11 to 20 of about 15,179 (189)

Secure Fully Homomorphic Authenticated Encryption [PDF]

open access: yesIEEE Access, 2021
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj   +5 more sources

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]

open access: yesPhysical Review X, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
W. K. Tham   +6 more
doaj   +8 more sources

An overview of torus fully homomorphic encryption [PDF]

open access: yesInternational Journal of Group Theory, 2023
The homomorphic encryption allows us to operate on encrypted data, making any action less vulnerable to hacking. The implementation of a fully homomorphic cryptosystem has long been impracticable. A breakthrough was achieved only in 2009 thanks to Gentry
Maria Ferrara   +2 more
doaj   +4 more sources

Quantum Fully Homomorphic Encryption With Verification [PDF]

open access: yes, 2017
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation.
A Broadbent   +9 more
core   +14 more sources

A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security

open access: yesTechnologies, 2019
Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive data.
Ahmed EL-YAHYAOUI   +1 more
doaj   +3 more sources

Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes

open access: yesIEEE Access, 2019
The first identity-based fully homomorphic encryption (IBFHE) scheme was constructed from identity-based encryption (IBE) and lattice-based cryptography by Gentry, Sahai, and Waters in CRYPTO 2013. Their IBFHE scheme is improved in this paper, exploiting
Tongchen Shen   +4 more
doaj   +3 more sources

SoK: Fully Homomorphic Encryption Accelerators

open access: yesACM Computing Surveys
Fully Homomorphic Encryption (FHE) is a key technology enabling privacy-preserving computing. However, the fundamental challenge of FHE is its inefficiency, due primarily to the underlying polynomial computations with high computation complexity and extremely time-consuming ciphertext maintenance operations.
Junxue Zhang   +5 more
openaire   +5 more sources

Homomorphic Evaluation Cluster Architecture for Fully Homomorphic Encryption

open access: yesIEEE Open Journal of Circuits and Systems
Fully Homomorphic Encryption (FHE) allows computational processing of encrypted data on cloud servers, providing high security and enabling safe data utilization.
Hanyoung Lee   +2 more
doaj   +2 more sources

Privacy-preserving genotype imputation with fully homomorphic encryption. [PDF]

open access: yesCell Syst, 2022
Gürsoy G   +4 more
europepmc   +2 more sources

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy