Results 91 to 100 of about 24,321 (191)

Homomorphic Encryption for Confidential Statistical Computation: Feasibility and Challenges

open access: yesJournal of Cybersecurity and Privacy
Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information.
Yesem Kurt Peker, Rahul Raj
doaj   +1 more source

Encrypted intelligence: A comparative analysis of homomorphic encryption frameworks for privacy-preserving AI

open access: yesJournal of Economy and Technology
This paper presents a comparative study of various homomorphic encryption models to evaluate their qualitative and quantitative benefits and drawbacks in performing computations on encrypted data.
Aadit Shah   +2 more
doaj   +1 more source

Confidential FRIT via homomorphic encryption

open access: yesSICE Journal of Control, Measurement, and System Integration
Edge computing alleviates the computation burden of data-driven control in cyber-physical systems (CPSs) by offloading complex processing to edge servers. However, the increasing sophistication of cyberattacks underscores the need for security measures that go beyond conventional IT protections and address the unique vulnerabilities of CPSs. This study
Haruki Hoshino   +3 more
openaire   +2 more sources

Processing Encrypted Data Using Homomorphic Encryption

open access: yes, 2017
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony   +14 more
openaire   +2 more sources

Fairly verifiable multi-user homomorphic proxy re-encryption scheme

open access: yesTongxin xuebao
To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate, a verifiable identity-based multi-user homomorphic proxy re-
HOU Jinqiu   +3 more
doaj  

Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks

open access: yesIEEE Access
In response to the security and privacy issues associated with sensing devices in contemporary crowd sensing systems, the paper proposes a crowd sensing networks method based on the MFHE (the Multi-Functional Homomorphic Encryption) architecture.
Hui Chen   +10 more
doaj   +1 more source

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei   +5 more
doaj   +1 more source

FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption

open access: yesCybersecurity
Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its unique capability of performing operations ...
Yao Pan   +5 more
doaj   +1 more source

Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping

open access: yes网络与信息安全学报
Multi-key fully homomorphic encryption (MK-FHE) technology supports homomorphic operations on ciphertexts encrypted with different keys, and can be directly applied to real-world multi-user data fusion computing scenarios, such as multi-party ...
ZHENG Junhua   +5 more
doaj  

Exact Homomorphic Encryption

open access: yes
Inspired by the concept of fault tolerance quantum computation, this article proposes a framework dubbed Exact Homomorphic Encryption, EHE, enabling exact computations on encrypted data without the need for pre-decryption. The introduction of quantum gates is a critical step for constructing the message encryption and the computation encryption within ...
Su, Zheng-Yao, Tsai, Ming-Chung
openaire   +2 more sources

Home - About - Disclaimer - Privacy