Results 21 to 30 of about 1,678 (176)
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
W. K. Tham +6 more
doaj +1 more source
Accelerating Fully Homomorphic Encryption in Hardware
We present a custom architecture for realizing the Gentry-Halevi fully homomorphic encryption (FHE) scheme. This contribution presents the first full realization of FHE in hardware. The architecture features an optimized multi-million bit multiplier based on the Schonhage Strassen multiplication algorithm.
Doroez, Yarkin +2 more
openaire +3 more sources
HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext ...
Zainab H. Mahmood, Mahmood K. Ibrahem
doaj +1 more source
Efficient SMC Protocol Based on Multi-Bit Fully Homomorphic Encryption
Aiming at the problems of large ciphertext size and low efficiency in the current secure multi-party computation (SMC) protocol based on fully homomorphic encryption (FHE), the paper proves that the fully homomorphic encryption scheme that supports multi-
Zong-Wu Zhu, Ru-Wei Huang
doaj +1 more source
Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj +1 more source
Quantum Fully Homomorphic Encryption with Verification [PDF]
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation. Given the numerous applications of classical FHE (zero-knowledge proofs, secure two-party computation, obfuscation, etc.) it is reasonable to hope that quantum FHE (or QFHE ...
Alagic, Gorjan +3 more
openaire +4 more sources
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Computation on ciphertexts of all known fully homomorphic encryption (FHE) schemes induces some noise, which, if too large, will destroy the plaintext.
Kamil Kluczniak, Leonard Schild
doaj +1 more source
Useable Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) enables arbitrary computations to be performed over encrypted data, eliminating the need to decrypt the data and expose it to potential risk while in use. FHE promises to significantly broaden the range of applications that can be secured with End-to-End encryption.
openaire +3 more sources
HE-Friendly Algorithm for Privacy-Preserving SVM Training
Support vector machine (SVM) is one of the most popular machine learning algorithms. It predicts a pre-defined output variable in real-world applications.
Saerom Park +4 more
doaj +1 more source
Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj +1 more source

