Results 11 to 20 of about 196,760 (255)
KmerCrypt: private k-mer search with homomorphic encryption. [PDF]
Provatas K +2 more
europepmc +3 more sources
This paper presents a comparative study of various homomorphic encryption models to evaluate their qualitative and quantitative benefits and drawbacks in performing computations on encrypted data.
Aadit Shah +2 more
doaj +2 more sources
LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]
Kumar S +5 more
europepmc +3 more sources
Is Homomorphic Encryption-Based Deep Learning Secure Enough? [PDF]
Shin J, Choi SH, Choi YH.
europepmc +3 more sources
Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption [PDF]
Quantum homomorphic encryption, which allows computation by a server directly on encrypted data, is a fundamental primitive out of which more complex quantum cryptography protocols can be built.
Yanglin Hu +2 more
doaj +1 more source
Secure Fully Homomorphic Authenticated Encryption
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj +1 more source
ARK: Fully Homomorphic Encryption Accelerator with Runtime Data Generation and Inter-Operation Key Reuse [PDF]
Homomorphic Encryption (HE) is one of the most promising post-quantum cryptographic schemes that enable privacy-preserving computation on servers.
Jongmin Kim +6 more
semanticscholar +1 more source
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing
Homomorphic encryption enables secure cloud computing over the complete data lifecycle. As so-called in-use encryption methodology, it allows using encrypted data for, e.g., data analysis—in contrast to classic encryption methods.
Raphael Kiesel +5 more
doaj +1 more source
F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption [PDF]
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted servers. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude slower than ...
Axel S. Feldmann +8 more
semanticscholar +1 more source
Homomorphic-Encrypted Volume Rendering [PDF]
Computationally demanding tasks are typically calculated in dedicated data centers, and real-time visualizations also follow this trend. Some rendering tasks, however, require the highest level of confidentiality so that no other party, besides the owner, can read or see the sensitive data.
Mazza, Sebastian +2 more
openaire +5 more sources

