Results 71 to 80 of about 15,179 (189)

FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and has great potential in privacy-preserving cloud computing and securely outsource computational tasks.
Yang Su   +3 more
doaj   +1 more source

Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption

open access: yes, 2012
This work addresses the characterization of homomorphic encryption schemes both in terms of security and design. In particular, we are interested in currently existing fully homomorphic encryption (FHE) schemes and their common structures and security.
Armknecht, Frederik   +2 more
openaire   +3 more sources

Improvised Version: Fully Homomorphic Encryption

open access: yesInternational Journal of Computer Applications, 2016
Homomorphic encryption schemes are malleable by design. In the field of homomorphic encryption schemes have made it possible to implement a variety of schemes using different techniques and programming languages. In this paper, we choose the model to increase the efficiency and security.
Pallavi P, Avinash Navlani
openaire   +1 more source

Multi-key Fully Homomorphic Encryption from Additive Homomorphism

open access: yesThe Computer Journal, 2021
Abstract Fully homomorphic encryption (FHE) allows direct computations over the encrypted data without access to the decryption. Hence multi-key FHE is well suitable for secure multiparty computation. Recently, Brakerski et al. (TCC 2019 and EUROCRYPT 2020) utilized additively homomorphic encryption to construct FHE schemes with ...
Wenju Xu   +5 more
openaire   +1 more source

Silene, a versatile model system: from sex and genome evolution to ecology and speciation

open access: yesNew Phytologist, EarlyView.
Summary Fundamental and applied research in evolutionary biology benefits from the use of model systems in which approaches from disparate disciplines can be integrated. Here, we review recent progress in evolutionary research on the long‐standing model system Silene, a large genus with a well‐resolved phylogeny and newly available, expanded genomic ...
Sophie Karrenberg   +16 more
wiley   +1 more source

Enabling Secure Database as a Service using Fully Homomorphic Encryption: Challenges and Opportunities [PDF]

open access: yes, 2013
The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solutions.
Gunda, Manikanta   +2 more
core  

A Review on Explainable, Federated Multimodal AI for Heart Disease Detection Using ECG, Cardiac Imaging, and Electronic Health Records

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Heart disease remains one of the most critical health challenges globally, accounting for a substantial number of deaths each year. With ML, DL, and FL coming into existence, early diagnosis of heart disease through ECG, Cardiac Imaging, and EHRs became increasingly feasible.
P. Murali, S. Meenatchi
wiley   +1 more source

Attribute-based fully homomorphic encryption scheme over rings

open access: yesTongxin xuebao, 2017
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted ...
Yong-hui ZHENG   +3 more
doaj   +2 more sources

Conditionals in Homomorphic Encryption and Machine Learning Applications [PDF]

open access: yes, 2018
Homomorphic encryption aims at allowing computations on encrypted data without decryption other than that of the final result. This could provide an elegant solution to the issue of privacy preservation in data-based applications, such as those using ...
Chialva, Diego, Dooms, Ann
core   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy