Results 101 to 110 of about 196,760 (255)
Chat Application Using Homomorphic Encryption [PDF]
Sagarik Behera +4 more
openalex +1 more source
Abstract Machine learning (ML) and generative artificial intelligence (GAI) in recent years are rapidly revolutionizing the healthcare industry offering improved precision and efficiency of healthcare delivery. The use of these advanced technologies in healthcare such as medical imaging, drug discoveries, predictive analytics, and personalized medicine
Muhammad Umar +10 more
wiley +1 more source
In this paper we consider fully homomorphic encryption based on the learning with errors problem. We present the problem as introduced by Oded Regev in 2009 and explain a simple public key cryptosystem based on it. We show how the scheme can be modified to be more suitable for homomorphic operations, and introduce bootstrapping, using the ideas ...
Ahmed El-Yahyaoui +1 more
openaire +3 more sources
Privacy-preserving approximate GWAS computation based on homomorphic encryption
Background One of three tasks in a secure genome analysis competition called iDASH 2018 was to develop a solution for privacy-preserving GWAS computation based on homomorphic encryption.
Duhyeong Kim +5 more
doaj +1 more source
Encrypted statistical machine learning: new privacy preserving methods [PDF]
We present two new statistical machine learning methods designed to learn on fully homomorphic encrypted (FHE) data. The introduction of FHE schemes following Gentry (2009) opens up the prospect of privacy preserving statistical machine learning analysis
Aslett, Louis J. M. +2 more
core
This graphical abstract illustrates the cloud‐based GWAS platform as a hub that integrates six major multiomics domains: phenomics, neuroscience, proteomics, microbiomics, metabolomics, and nutrigenomics. The platform unifies diverse data types—including clinical phenotypes, neuroimaging, plasma proteomics, microbiome profiles, metabolic biomarkers ...
Xiaohong Ke +12 more
wiley +1 more source
A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks
In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed.
Xiaoqiang Sun +4 more
doaj +1 more source
Verifiable Rotation of Homomorphic Encryptions [PDF]
Similar to verifiable shuffling (mixing), we consider the problem of verifiable rotating a given list of homomorphic encryptions. The offset by which the list is rotated (cyclic shift) should remain hidden. Basically, we will present zero-knowledge proofs of knowledge of a rotation offset and re-encryption exponents, which define how the input list is ...
Hoogh, de, S.J.A. +3 more
openaire +1 more source
ABSTRACT Distyly is a reproductive system, characterized by the presence of two floral morphs, which promotes outcrossing via physical and biochemical means. In distylous Turnera, the mating type of the S‐morph is determined by two genes: YUC6 (male) and BAHD (female).
Paige M. Henning +3 more
wiley +1 more source
Ciphertext Policy Attribute based Homomorphic Encryption (CP-ABHERLWE): a fine-grained access control on outsourced cloud data computation [PDF]
Recently, homomorphic encryption is becoming one of the holy grail in modern cryptography research and serve as a promising tools to protect outsourced data solutions on cloud service providers.
Azman Samsudin, Tan, Soo Fun
core

