Results 21 to 30 of about 15,179 (189)

Research on privacy information retrieval model based on hybrid homomorphic encryption

open access: yesCybersecurity, 2023
The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low.
Wei-tao Song   +3 more
doaj   +1 more source

SoK: Fully Homomorphic Encryption Compilers [PDF]

open access: yes2021 IEEE Symposium on Security and Privacy (SP), 2021
2021 IEEE Symposium on Security and Privacy (SP)
Viand, Alexander   +2 more
openaire   +4 more sources

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION

open access: yesICTACT Journal on Soft Computing, 2021
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud.
M Yogasini, B N Prathibha
doaj   +1 more source

Logistic regression over encrypted data from fully homomorphic encryption. [PDF]

open access: yesBMC Med Genomics, 2018
One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic data. More precisely, given a list of approximately 1500 patient records, each with 18 binary features containing information on specific mutations, the idea was for the data holder to encrypt the records ...
Chen H   +6 more
europepmc   +5 more sources

Fully Homomorphic Encryption

open access: yes, 2022
AbstractIn 1978, Rivest et al. (1978) proposed the concepts of data bank and fully homomorphic encryption. Some individuals and organizations encrypt the original data and store them in the data bank for privacy protection. Data bank is also called data cloud. Therefore, the cloud stores a large amount of original data, which is obviously a huge wealth.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

Multikey Fully Homomorphic Encryption and Applications [PDF]

open access: yesSIAM Journal on Computing, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
López-Alt, Adriana   +2 more
openaire   +3 more sources

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

Home - About - Disclaimer - Privacy