Results 21 to 30 of about 1,678 (176)

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

open access: yesPhysical Review X, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
W. K. Tham   +6 more
doaj   +1 more source

Accelerating Fully Homomorphic Encryption in Hardware

open access: yesIEEE Transactions on Computers, 2014
We present a custom architecture for realizing the Gentry-Halevi fully homomorphic encryption (FHE) scheme. This contribution presents the first full realization of FHE in hardware. The architecture features an optimized multi-million bit multiplier based on the Schonhage Strassen multiplication algorithm.
Doroez, Yarkin   +2 more
openaire   +3 more sources

HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV

open access: yesIraqi Journal of Information & Communication Technology, 2019
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext ...
Zainab H. Mahmood, Mahmood K. Ibrahem
doaj   +1 more source

Efficient SMC Protocol Based on Multi-Bit Fully Homomorphic Encryption

open access: yesApplied Sciences, 2021
Aiming at the problems of large ciphertext size and low efficiency in the current secure multi-party computation (SMC) protocol based on fully homomorphic encryption (FHE), the paper proves that the fully homomorphic encryption scheme that supports multi-
Zong-Wu Zhu, Ru-Wei Huang
doaj   +1 more source

Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE

open access: yesApplied Sciences, 2022
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj   +1 more source

Quantum Fully Homomorphic Encryption with Verification [PDF]

open access: yes, 2017
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation. Given the numerous applications of classical FHE (zero-knowledge proofs, secure two-party computation, obfuscation, etc.) it is reasonable to hope that quantum FHE (or QFHE ...
Alagic, Gorjan   +3 more
openaire   +4 more sources

FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Computation on ciphertexts of all known fully homomorphic encryption (FHE) schemes induces some noise, which, if too large, will destroy the plaintext.
Kamil Kluczniak, Leonard Schild
doaj   +1 more source

Useable Fully Homomorphic Encryption

open access: yes, 2023
Fully Homomorphic Encryption (FHE) enables arbitrary computations to be performed over encrypted data, eliminating the need to decrypt the data and expose it to potential risk while in use. FHE promises to significantly broaden the range of applications that can be secured with End-to-End encryption.
openaire   +3 more sources

HE-Friendly Algorithm for Privacy-Preserving SVM Training

open access: yesIEEE Access, 2020
Support vector machine (SVM) is one of the most popular machine learning algorithms. It predicts a pre-defined output variable in real-world applications.
Saerom Park   +4 more
doaj   +1 more source

Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems

open access: yesБезопасность информационных технологий, 2021
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj   +1 more source

Home - About - Disclaimer - Privacy