Results 231 to 240 of about 196,760 (255)
Some of the next articles are maybe not open access.
Homomorphic Encryption for Secure Data Analysis: A Hybrid Approach using PKCS1_OAEP Padding
2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)In today's data-driven world, striking a balance between data utility and privacy is paramount. Homomorphic encryption, a revolutionary cryptographic technique, facilitates computations on encrypted data without decryption.
Shanmukha Aditya G +3 more
semanticscholar +1 more source
Privacy-Preserving Network Traffic Analysis Using Homomorphic Encryption
2024 International Conference on Integrated Circuits and Communication Systems (ICICACS)Privacy and Homomorphic Encryption are effective ways for securely evaluating network records by encrypting them with a sophisticated cryptographic algorithm.
S. E. V. S. Pillai, Kiran Polimetla
semanticscholar +1 more source
2014
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire +1 more source
Homomorphic encryption is a very useful tool with a number of attractive applications. However, the applications are limited by the fact that only one operation is possible (usually addition or multiplication in the plaintext space) to be able to manipulate the plaintext by using only the ciphertext. What would really be useful is to be able to utilize
Xun Yi, Russell Paulet, Elisa Bertino
openaire +1 more source
Journal of Electronic Imaging, 2009
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire +1 more source
This paper presents a new homomorphic image cryptosystem. The idea of this system is based on encrypting the reflectance component after the homomorphic transform and embedding the illumination component as a least significant bit watermark into the encrypted reflectance component.
openaire +1 more source
Subring Homomorphic Encryption
2018In this paper, we construct subring homomorphic encryption scheme that is a homomorphic encryption scheme built on the decomposition ring, which is a subring of cyclotomic ring. In the scheme, each plaintext slot contains an integer in \(\mathbb {Z}_{p^l}\), rather than an element of \(\mathrm {GF}(p^d)\) as in conventional homomorphic encryption ...
Seiko Arita, Sari Handa
openaire +1 more source
Parallel Homomorphic Encryption
2013In the problem of private outsourced computation, a client wishes to delegate the evaluation of a function f on a private input x to an untrusted worker without the latter learning anything about x and f(x). This problem occurs in many applications and, most notably, in the setting of cloud computing.
Seny Kamara, Mariana Raykova
openaire +1 more source
Homomorphic Encryption for Arithmetic of Approximate Numbers
International Conference on the Theory and Application of Cryptology and Information Security, 2017J. Cheon +3 more
semanticscholar +1 more source
Homomorphic Encryption Schemes
2018Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data. This type of encryption can be used to perform operations on encrypted data by a server without having to provide the key. An example application is searching or querying an encrypted database.
Kannan Balasubramanian +1 more
openaire +1 more source
(Leveled) Fully Homomorphic Encryption without Bootstrapping
ACM Transactions on Computation Theory, 2014Zvika Brakerski +2 more
semanticscholar +1 more source

