Results 61 to 70 of about 15,179 (189)

On Constructing a Fully Homomorphic Encryption

open access: yesТруды Института системного программирования РАН, 2018
Suggested a new construction for full homomorphic encryption which doesn’t use an extra information on secret key.
A. V. Shokurov, K. V. Sergeev
doaj   +1 more source

Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption

open access: yesIEEE Access, 2021
Fully homomorphic encryption enables to perform arbitrary computation over encrypted data, providing a powerful tool for secure outsourced computation on an untrusted environment.
Haoran Zong, Hai Huang, Shufang Wang
doaj   +1 more source

Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]

open access: yes, 2020
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi   +8 more
core   +1 more source

Initial State Privacy of Nonlinear Systems on Riemannian Manifolds

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley   +1 more source

Lifecycle‐Based Governance to Build Reliable Ethical AI Systems

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley   +1 more source

Leakage Resilient Fully Homomorphic Encryption [PDF]

open access: yes, 2014
We construct the first leakage resilient variants of fully homomorphic encryption (FHE) schemes. Our leakage model is bounded adaptive leakage resilience. We first construct a leakage-resilient leveled FHE scheme, meaning the scheme is homomorphic for all circuits of depth less than some pre-established maximum set at key generation.
Alexandra Berkoff, Feng-Hao Liu
openaire   +1 more source

HECO: Fully Homomorphic Encryption Compiler

open access: yes, 2022
In recent years, Fully Homomorphic Encryption (FHE) has undergone several breakthroughs and advancements, leading to a leap in performance. Today, performance is no longer a major barrier to adoption. Instead, it is the complexity of developing an efficient FHE application that currently limits deploying FHE in practice and at scale.
Viand, Alexander   +3 more
openaire   +2 more sources

Privacy preserving distributed optimization using homomorphic encryption

open access: yes, 2018
This paper studies how a system operator and a set of agents securely execute a distributed projected gradient-based algorithm. In particular, each participant holds a set of problem coefficients and/or states whose values are private to the data owner ...
Lu, Yang, Zhu, Minghui
core   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Overflow-Detectable Floating-Point Fully Homomorphic Encryption

open access: yesIEEE Access
A floating-point fully homomorphic encryption (FPFHE) is proposed, which is based on torus fully homomorphic encryption equipped with programmable bootstrapping.
Seunghwan Lee, Dong-Joon Shin
doaj   +1 more source

Home - About - Disclaimer - Privacy