Results 31 to 40 of about 15,179 (189)
Verifiable Fully Homomorphic Encryption
13 pages + References ...
Viand, Alexander +2 more
openaire +2 more sources
Classical Homomorphic Encryption for Quantum Circuits [PDF]
We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys. The scheme allows a classical client to blindly delegate a quantum computation to a quantum server: an honest server is able to run the computation
Mahadev, Urmila
core +2 more sources
(Leveled) Fully Homomorphic Encryption without Bootstrapping [PDF]
We present a novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions. A central conceptual contribution in our work is a new way of constructing leveled, fully homomorphic encryption schemes (capable of evaluating arbitrary polynomial-size circuits of a-priori bounded depth ...
Brakerski, Zvika +2 more
openaire +1 more source
In this paper we consider fully homomorphic encryption based on the learning with errors problem. We present the problem as introduced by Oded Regev in 2009 and explain a simple public key cryptosystem based on it. We show how the scheme can be modified to be more suitable for homomorphic operations, and introduce bootstrapping, using the ideas ...
Ahmed El-Yahyaoui +1 more
openaire +3 more sources
Limitations on information-theoretically-secure quantum homomorphic encryption [PDF]
Homomorphic encryption is a form of encryption which allows computation to be carried out on the encrypted data without the need for decryption. The success of quantum approaches to related tasks in a delegated computation setting has raised the question
A. Broadbent +18 more
core +2 more sources
Faster Fully Homomorphic Encryption [PDF]
We describe two improvements to Gentry’s fully homomorphic scheme based on ideal lattices and its analysis: we provide a more aggressive analysis of one of the hardness assumptions (the one related to the Sparse Subset Sum Problem) and we introduce a probabilistic decryption algorithm that can be implemented with an algebraic circuit of low ...
Stehlé, Damien, Steinfeld, Ron
openaire +2 more sources
Cyber physical system (CPS) is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components, the development of cyber physical systems is constrained by security and ...
Zhaoe Min +4 more
doaj +1 more source
Survey on Application of Homomorphic Encryption in Deep Learning [PDF]
With the widespread application of deep learning in various fields, data privacy and security issues have become increasingly important. Homomorphic encryption, a technique that allows computations to be performed directly on encrypted data, offers a ...
YANG Hongchao, YI Mengjun, LI Peijia, ZHANG Hanwen, SHEN Furao, ZHAO Jian, WANG Liuwang
doaj +1 more source
Accelerating Fully Homomorphic Encryption in Hardware
We present a custom architecture for realizing the Gentry-Halevi fully homomorphic encryption (FHE) scheme. This contribution presents the first full realization of FHE in hardware. The architecture features an optimized multi-million bit multiplier based on the Schonhage Strassen multiplication algorithm.
Doroez, Yarkin +2 more
openaire +3 more sources
HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext ...
Zainab H. Mahmood, Mahmood K. Ibrahem
doaj +1 more source

