Results 51 to 60 of about 15,179 (189)

Revisiting Fully Homomorphic Encryption Schemes

open access: yes, 2023
A quick summary of Fully Homomorphic Encryption Schemes along with their background, concepts, applications and open-source ...
Jain, Nimish, Cherukuri, Aswani Kumar
openaire   +2 more sources

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]

open access: yes, 2013
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M.   +2 more
core   +1 more source

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography [PDF]

open access: yes, 2021
Human mobility is undisputedly one of the critical factors in infectious disease dynamics. Until a few years ago, researchers had to rely on static data to model human mobility, which was then combined with a transmission model of a particular disease ...
Bampoulidis, Alexandros   +5 more
core   +1 more source

An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Privacy-Preserving Feature Selection with Fully Homomorphic Encryption

open access: yesAlgorithms, 2022
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value x(Fi) and the class label x(C) are given for each x∈D and Fi∈F. For a triple (
Shinji Ono   +5 more
doaj   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Homomorphic encryption and some black box attacks

open access: yes, 2020
This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes ...
A Acar   +10 more
core   +1 more source

Frequency Shaping for Improving a Trade‐Off Between Control and Privacy Performance: Beyond Differential Privacy

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In privacy protection of control systems, a trade‐off between control performance and privacy level is often pointed out. Our goal in this paper is to improve this trade‐off by shaping the frequency of noise added for privacy protection when the control objective is to track a reference signal, which is taken as a piece of information whose ...
Rintaro Watanabe   +3 more
wiley   +1 more source

SoK: Fully Homomorphic Encryption over the [Discretized] Torus

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
First posed as a challenge in 1978 by Rivest et al., fully homomorphic encryption—the ability to evaluate any function over encrypted data—was only solved in 2009 in a breakthrough result by Gentry (Commun. ACM, 2010). After a decade of intense research,
Marc Joye
doaj   +3 more sources

Home - About - Disclaimer - Privacy