Results 91 to 100 of about 24,321 (191)
Homomorphic Encryption for Confidential Statistical Computation: Feasibility and Challenges
Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information.
Yesem Kurt Peker, Rahul Raj
doaj +1 more source
This paper presents a comparative study of various homomorphic encryption models to evaluate their qualitative and quantitative benefits and drawbacks in performing computations on encrypted data.
Aadit Shah +2 more
doaj +1 more source
Confidential FRIT via homomorphic encryption
Edge computing alleviates the computation burden of data-driven control in cyber-physical systems (CPSs) by offloading complex processing to edge servers. However, the increasing sophistication of cyberattacks underscores the need for security measures that go beyond conventional IT protections and address the unique vulnerabilities of CPSs. This study
Haruki Hoshino +3 more
openaire +2 more sources
Processing Encrypted Data Using Homomorphic Encryption
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony +14 more
openaire +2 more sources
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate, a verifiable identity-based multi-user homomorphic proxy re-
HOU Jinqiu +3 more
doaj
Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks
In response to the security and privacy issues associated with sensing devices in contemporary crowd sensing systems, the paper proposes a crowd sensing networks method based on the MFHE (the Multi-Functional Homomorphic Encryption) architecture.
Hui Chen +10 more
doaj +1 more source
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei +5 more
doaj +1 more source
Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its unique capability of performing operations ...
Yao Pan +5 more
doaj +1 more source
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Multi-key fully homomorphic encryption (MK-FHE) technology supports homomorphic operations on ciphertexts encrypted with different keys, and can be directly applied to real-world multi-user data fusion computing scenarios, such as multi-party ...
ZHENG Junhua +5 more
doaj
Inspired by the concept of fault tolerance quantum computation, this article proposes a framework dubbed Exact Homomorphic Encryption, EHE, enabling exact computations on encrypted data without the need for pre-decryption. The introduction of quantum gates is a critical step for constructing the message encryption and the computation encryption within ...
Su, Zheng-Yao, Tsai, Ming-Chung
openaire +2 more sources

