Results 1 to 10 of about 24,321 (191)

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]

open access: yesPhysical Review X, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
W. K. Tham   +6 more
doaj   +3 more sources

Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption [PDF]

open access: yesQuantum, 2023
Quantum homomorphic encryption, which allows computation by a server directly on encrypted data, is a fundamental primitive out of which more complex quantum cryptography protocols can be built.
Yanglin Hu   +2 more
doaj   +1 more source

Secure Fully Homomorphic Authenticated Encryption

open access: yesIEEE Access, 2021
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj   +1 more source

Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing

open access: yesJournal of Cybersecurity and Privacy, 2023
Homomorphic encryption enables secure cloud computing over the complete data lifecycle. As so-called in-use encryption methodology, it allows using encrypted data for, e.g., data analysis—in contrast to classic encryption methods.
Raphael Kiesel   +5 more
doaj   +1 more source

Homomorphic-Encrypted Volume Rendering [PDF]

open access: yesIEEE Transactions on Visualization and Computer Graphics, 2021
Computationally demanding tasks are typically calculated in dedicated data centers, and real-time visualizations also follow this trend. Some rendering tasks, however, require the highest level of confidentiality so that no other party, besides the owner, can read or see the sensitive data.
Mazza, Sebastian   +2 more
openaire   +5 more sources

Experimental quantum homomorphic encryption [PDF]

open access: yesnpj Quantum Information, 2021
AbstractQuantum computers promise not only to outperform classical machines for certain important tasks, but also to preserve privacy of computation. For example, the blind quantum computing protocol enables secure delegated quantum computation, where a client can protect the privacy of their data and algorithms from a quantum server assigned to run ...
Zeuner, Jonas   +6 more
openaire   +5 more sources

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]

open access: yes, 2014
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik   +3 more
core   +10 more sources

Research on privacy information retrieval model based on hybrid homomorphic encryption

open access: yesCybersecurity, 2023
The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low.
Wei-tao Song   +3 more
doaj   +1 more source

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

open access: yesEntropy, 2022
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first
Rafik Hamza   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy