Results 51 to 60 of about 15,179 (189)
Revisiting Fully Homomorphic Encryption Schemes
A quick summary of Fully Homomorphic Encryption Schemes along with their background, concepts, applications and open-source ...
Jain, Nimish, Cherukuri, Aswani Kumar
openaire +2 more sources
Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M. +2 more
core +1 more source
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography [PDF]
Human mobility is undisputedly one of the critical factors in infectious disease dynamics. Until a few years ago, researchers had to rely on static data to model human mobility, which was then combined with a transmission model of a particular disease ...
Bampoulidis, Alexandros +5 more
core +1 more source
An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Privacy-Preserving Feature Selection with Fully Homomorphic Encryption
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value x(Fi) and the class label x(C) are given for each x∈D and Fi∈F. For a triple (
Shinji Ono +5 more
doaj +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
Homomorphic encryption and some black box attacks
This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes ...
A Acar +10 more
core +1 more source
ABSTRACT In privacy protection of control systems, a trade‐off between control performance and privacy level is often pointed out. Our goal in this paper is to improve this trade‐off by shaping the frequency of noise added for privacy protection when the control objective is to track a reference signal, which is taken as a piece of information whose ...
Rintaro Watanabe +3 more
wiley +1 more source
SoK: Fully Homomorphic Encryption over the [Discretized] Torus
First posed as a challenge in 1978 by Rivest et al., fully homomorphic encryption—the ability to evaluate any function over encrypted data—was only solved in 2009 in a breakthrough result by Gentry (Commun. ACM, 2010). After a decade of intense research,
Marc Joye
doaj +3 more sources

