Results 111 to 120 of about 196,760 (255)
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives
Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations ...
Siddhartha Siddhiprada Bhoi +3 more
doaj +1 more source
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities [PDF]
Bernardo Pulido-Gaytán +6 more
openalex +1 more source
Secure Cloud Computing Using Homomorphic Encryption
The question of cloud security has become more significant with growing popularity of cloud computing. This article is dedicated to fully homomorphic encryption which is one of the most promising methods to reach the necessary level of privacy.
Alexander Olegovich Zhirov +2 more
doaj
This paper proposes a pruned homomorphic encryption-based collaborative federated learning algorithm to address the issues of non-uniform data distribution, overfitting caused by residual gradient features, and privacy leakage risks in power big data ...
Weijian Zhang +4 more
doaj +1 more source
Bootstrapping Homomorphic Encryption via Functional Encryption
Homomorphic encryption is a central object in modern cryptography, with far-reaching applications. Constructions supporting homomorphic evaluation of arbitrary Boolean circuits have been known for over a decade, based on standard lattice assumptions. However, these constructions are leveled, meaning that they only support circuits up to some a-priori ...
Bitansky, Nir, Solomon, Tomer
openaire +4 more sources
A new lightweight additive homomorphic encryption algorithm [PDF]
Wuqiong Pan, Hongliang Gu
openalex +1 more source
Homomorphic Encryption: Theory & Applications
Book Chapter accepted for publication in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), to be published by INTECH Publishers, Croatia. Expected month of publication: June 2013.
openaire +2 more sources
Attribute-based fully homomorphic encryption scheme over rings
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted ...
Yong-hui ZHENG +3 more
doaj +2 more sources
RLHMBC: A novel lightweight symmetric cipher supporting multiplicative homomorphism
Homomorphic Encryption (HE), which enables computations to be done directly on encrypted data without sacrificing privacy, has become a key technology for safe data processing in recent years.
Yara Al Haddad +4 more
doaj +1 more source
Innovative Homomorphic Sorting of Environmental Data in Area Monitoring Wireless Sensor Networks
In many special cases, the data collected from wireless sensor networks are stored in encrypted form to provide the required privacy. Sorting is an essential operation on any stored data for orderly presentation and fast searching.
Neeta B. Malvi, N. Shylashree
doaj +1 more source

