Results 121 to 130 of about 196,760 (255)
Optimal Rate Private Information Retrieval from Homomorphic Encryption [PDF]
Aggelos Kiayias +4 more
openalex +1 more source
Fully homomorphic encryption using ideal lattices
Craig Gentry
semanticscholar +1 more source
Confidential FRIT via homomorphic encryption
Edge computing alleviates the computation burden of data-driven control in cyber-physical systems (CPSs) by offloading complex processing to edge servers. However, the increasing sophistication of cyberattacks underscores the need for security measures that go beyond conventional IT protections and address the unique vulnerabilities of CPSs. This study
Haruki Hoshino +3 more
openaire +2 more sources
Processing Encrypted Data Using Homomorphic Encryption
Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work.
Barnett, Anthony +14 more
openaire +2 more sources
Healthcare data has risen as a top target for cyberattacks due to the rich amount of sensitive patient information. This negatively affects the potential of advanced analytics and collaborative research in healthcare.
Chian Hui Lee +2 more
doaj +1 more source
Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks
In response to the security and privacy issues associated with sensing devices in contemporary crowd sensing systems, the paper proposes a crowd sensing networks method based on the MFHE (the Multi-Functional Homomorphic Encryption) architecture.
Hui Chen +10 more
doaj +1 more source
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
To address the challenges of multi-user ciphertext sharing and secure fair computation in untrusted cloud environments where traditional fully homomorphic encryption algorithms prove inadequate, a verifiable identity-based multi-user homomorphic proxy re-
HOU Jinqiu +3 more
doaj
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei +5 more
doaj +1 more source
Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning [PDF]
Yifei Zhang, Hao Zhu
openalex +1 more source

