Results 121 to 130 of about 196,760 (255)

Optimal Rate Private Information Retrieval from Homomorphic Encryption [PDF]

open access: hybrid, 2015
Aggelos Kiayias   +4 more
openalex   +1 more source

Fully homomorphic encryption using ideal lattices

open access: yesSymposium on the Theory of Computing, 2009
Craig Gentry
semanticscholar   +1 more source

Confidential FRIT via homomorphic encryption

open access: yesSICE Journal of Control, Measurement, and System Integration
Edge computing alleviates the computation burden of data-driven control in cyber-physical systems (CPSs) by offloading complex processing to edge servers. However, the increasing sophistication of cyberattacks underscores the need for security measures that go beyond conventional IT protections and address the unique vulnerabilities of CPSs. This study
Haruki Hoshino   +3 more
openaire   +2 more sources

Processing Encrypted Data Using Homomorphic Encryption

open access: yes, 2017
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony   +14 more
openaire   +2 more sources

A comprehensive survey on secure healthcare data processing with homomorphic encryption: attacks and defenses

open access: yesDiscover Public Health
Healthcare data has risen as a top target for cyberattacks due to the rich amount of sensitive patient information. This negatively affects the potential of advanced analytics and collaborative research in healthcare.
Chian Hui Lee   +2 more
doaj   +1 more source

Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks

open access: yesIEEE Access
In response to the security and privacy issues associated with sensing devices in contemporary crowd sensing systems, the paper proposes a crowd sensing networks method based on the MFHE (the Multi-Functional Homomorphic Encryption) architecture.
Hui Chen   +10 more
doaj   +1 more source

Fairly verifiable multi-user homomorphic proxy re-encryption scheme

open access: yesTongxin xuebao
To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate, a verifiable identity-based multi-user homomorphic proxy re-
HOU Jinqiu   +3 more
doaj  

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy