Results 61 to 70 of about 15,179 (189)
On Constructing a Fully Homomorphic Encryption
Suggested a new construction for full homomorphic encryption which doesn’t use an extra information on secret key.
A. V. Shokurov, K. V. Sergeev
doaj +1 more source
Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption
Fully homomorphic encryption enables to perform arbitrary computation over encrypted data, providing a powerful tool for secure outsourced computation on an untrusted environment.
Haoran Zong, Hai Huang, Shufang Wang
doaj +1 more source
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi +8 more
core +1 more source
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Leakage Resilient Fully Homomorphic Encryption [PDF]
We construct the first leakage resilient variants of fully homomorphic encryption (FHE) schemes. Our leakage model is bounded adaptive leakage resilience. We first construct a leakage-resilient leveled FHE scheme, meaning the scheme is homomorphic for all circuits of depth less than some pre-established maximum set at key generation.
Alexandra Berkoff, Feng-Hao Liu
openaire +1 more source
HECO: Fully Homomorphic Encryption Compiler
In recent years, Fully Homomorphic Encryption (FHE) has undergone several breakthroughs and advancements, leading to a leap in performance. Today, performance is no longer a major barrier to adoption. Instead, it is the complexity of developing an efficient FHE application that currently limits deploying FHE in practice and at scale.
Viand, Alexander +3 more
openaire +2 more sources
Privacy preserving distributed optimization using homomorphic encryption
This paper studies how a system operator and a set of agents securely execute a distributed projected gradient-based algorithm. In particular, each participant holds a set of problem coefficients and/or states whose values are private to the data owner ...
Lu, Yang, Zhu, Minghui
core +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Overflow-Detectable Floating-Point Fully Homomorphic Encryption
A floating-point fully homomorphic encryption (FPFHE) is proposed, which is based on torus fully homomorphic encryption equipped with programmable bootstrapping.
Seunghwan Lee, Dong-Joon Shin
doaj +1 more source

