Results 11 to 20 of about 24,321 (191)

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing

open access: yesSensors, 2021
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can ...
Juyan Li   +3 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

The Wire Is Not the Territory: Understanding Representational Drift in Olfaction With Dynamical Systems Theory

open access: yesTopics in Cognitive Science, EarlyView., 2023
Abstract Representational drift is a phenomenon of increasing interest in the cognitive and neural sciences. While investigations are ongoing for other sensory cortices, recent research has demonstrated the pervasiveness in which it occurs in the piriform cortex for olfaction.
Ann‐Sophie Barwich   +1 more
wiley   +1 more source

Multiple to One Fully Homomorphic Encryption Algorithm Based on Integer Polynomial Ring [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the limitation that most traditional public key encryption mode can only send messages from a single sender to a single receiver,a one to one homomorphic encryption algorithm based on integer polynomial ring is designed based on integer ...
WANG Caifen,ZHAO Bing,LIU Chao,CHENG Yudan,XU Qinbai
doaj   +1 more source

Homomorphic Encryption

open access: yes, 2023
AbstractHomomorphic encryption is a technique in cryptography that allows for performing operations on encrypted data. The encrypted result can then be decrypted to obtain the operation result, making it possible to perform computations on sensitive data without revealing it.
  +5 more sources

Achieving GWAS with homomorphic encryption [PDF]

open access: yesBMC Medical Genomics, 2020
Abstract Background One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This raises privacy and security concerns as these genetic markers can be used to identify individuals uniquely.
Jun Jie Sim   +4 more
openaire   +4 more sources

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

Homomorphic Encryption on GPU

open access: yesIEEE Access, 2023
Homomorphic encryption (HE) is a cryptosystem that allows the secure processing of encrypted data. One of the most popular HE schemes is the Brakerski-Fan-Vercauteren (BFV), which supports somewhat (SWHE) and fully homomorphic encryption (FHE). Since overly involved arithmetic operations of HE schemes are amenable to concurrent computation, GPU devices
Ali Şah Özcan   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy