Results 151 to 160 of about 24,321 (191)
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. [PDF]
Koirala N +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Unification Modulo Homomorphic Encryption
Journal of Automated Reasoning, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Anantharaman, Siva +4 more
openaire +3 more sources
2014
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire +1 more source
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire +1 more source
Journal of Electronic Imaging, 2009
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire +1 more source
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire +1 more source
Subring Homomorphic Encryption
2018In this paper, we construct subring homomorphic encryption scheme that is a homomorphic encryption scheme built on the decomposition ring, which is a subring of cyclotomic ring. In the scheme, each plaintext slot contains an integer in \(\mathbb {Z}_{p^l}\), rather than an element of \(\mathrm {GF}(p^d)\) as in conventional homomorphic encryption ...
Seiko Arita, Sari Handa
openaire +1 more source
Parallel Homomorphic Encryption
2013In the problem of private outsourced computation, a client wishes to delegate the evaluation of a function f on a private input x to an untrusted worker without the latter learning anything about x and f(x). This problem occurs in many applications and, most notably, in the setting of cloud computing.
Seny Kamara, Mariana Raykova
openaire +1 more source
Homomorphic Encryption Schemes
2018Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data. This type of encryption can be used to perform operations on encrypted data by a server without having to provide the key. An example application is searching or querying an encrypted database.
Kannan Balasubramanian +1 more
openaire +1 more source

