Results 111 to 120 of about 196,760 (255)

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

open access: yesCryptography
Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations ...
Siddhartha Siddhiprada Bhoi   +3 more
doaj   +1 more source

Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities [PDF]

open access: hybrid, 2021
Bernardo Pulido-Gaytán   +6 more
openalex   +1 more source

Secure Cloud Computing Using Homomorphic Encryption

open access: yesБезопасность информационных технологий, 2013
The question of cloud security has become more significant with growing popularity of cloud computing. This article is dedicated to fully homomorphic encryption which is one of the most promising methods to reach the necessary level of privacy.
Alexander Olegovich Zhirov   +2 more
doaj  

Design of a federated learning algorithm for power big data privacy computing based on pruning technique and homomorphic encryption

open access: yesEgyptian Informatics Journal
This paper proposes a pruned homomorphic encryption-based collaborative federated learning algorithm to address the issues of non-uniform data distribution, overfitting caused by residual gradient features, and privacy leakage risks in power big data ...
Weijian Zhang   +4 more
doaj   +1 more source

Bootstrapping Homomorphic Encryption via Functional Encryption

open access: yes, 2023
Homomorphic encryption is a central object in modern cryptography, with far-reaching applications. Constructions supporting homomorphic evaluation of arbitrary Boolean circuits have been known for over a decade, based on standard lattice assumptions. However, these constructions are leveled, meaning that they only support circuits up to some a-priori ...
Bitansky, Nir, Solomon, Tomer
openaire   +4 more sources

Homomorphic Encryption: Theory & Applications

open access: yes, 2013
Book Chapter accepted for publication in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), to be published by INTECH Publishers, Croatia. Expected month of publication: June 2013.
openaire   +2 more sources

Attribute-based fully homomorphic encryption scheme over rings

open access: yesTongxin xuebao, 2017
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted ...
Yong-hui ZHENG   +3 more
doaj   +2 more sources

RLHMBC: A novel lightweight symmetric cipher supporting multiplicative homomorphism

open access: yesJournal of King Saud University: Computer and Information Sciences
Homomorphic Encryption (HE), which enables computations to be done directly on encrypted data without sacrificing privacy, has become a key technology for safe data processing in recent years.
Yara Al Haddad   +4 more
doaj   +1 more source

Innovative Homomorphic Sorting of Environmental Data in Area Monitoring Wireless Sensor Networks

open access: yesIEEE Access
In many special cases, the data collected from wireless sensor networks are stored in encrypted form to provide the required privacy. Sorting is an essential operation on any stored data for orderly presentation and fast searching.
Neeta B. Malvi, N. Shylashree
doaj   +1 more source

Home - About - Disclaimer - Privacy