Results 41 to 50 of about 15,179 (189)

Reusable garbled gates for new fully homomorphic encryption service [PDF]

open access: yes, 2017
In this paper, we propose a novel way to provide a fully homomorphic encryption service, namely by using garbled circuits. From a high level perspective, garbled circuits and fully homomorphic encryption, both aim at implementing complex computation on ...
Cao, Yunfei   +4 more
core   +2 more sources

Efficient SMC Protocol Based on Multi-Bit Fully Homomorphic Encryption

open access: yesApplied Sciences, 2021
Aiming at the problems of large ciphertext size and low efficiency in the current secure multi-party computation (SMC) protocol based on fully homomorphic encryption (FHE), the paper proves that the fully homomorphic encryption scheme that supports multi-
Zong-Wu Zhu, Ru-Wei Huang
doaj   +1 more source

Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE

open access: yesApplied Sciences, 2022
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj   +1 more source

FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Computation on ciphertexts of all known fully homomorphic encryption (FHE) schemes induces some noise, which, if too large, will destroy the plaintext.
Kamil Kluczniak, Leonard Schild
doaj   +1 more source

Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption [PDF]

open access: yes, 2019
This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method.
Farokhi, Farhad   +2 more
core   +2 more sources

Useable Fully Homomorphic Encryption

open access: yes, 2023
Fully Homomorphic Encryption (FHE) enables arbitrary computations to be performed over encrypted data, eliminating the need to decrypt the data and expose it to potential risk while in use. FHE promises to significantly broaden the range of applications that can be secured with End-to-End encryption.
openaire   +3 more sources

Simple Encrypted Arithmetic Library - SEAL v2.1 [PDF]

open access: yes, 2017
Achieving fully homomorphic encryption was a longstanding open problem in cryptography until it was resolved by Gentry in 2009. Soon after, several homomorphic encryption schemes were proposed.
Chen, Hao, Laine, Kim, Player, Rachel
core   +2 more sources

HE-Friendly Algorithm for Privacy-Preserving SVM Training

open access: yesIEEE Access, 2020
Support vector machine (SVM) is one of the most popular machine learning algorithms. It predicts a pre-defined output variable in real-world applications.
Saerom Park   +4 more
doaj   +1 more source

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]

open access: yes, 2019
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B.   +5 more
core   +2 more sources

Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems

open access: yesБезопасность информационных технологий, 2021
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj   +1 more source

Home - About - Disclaimer - Privacy