Results 31 to 40 of about 24,321 (191)

Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping

open access: yesMathematics, 2023
Multi-key Homomorphic Encryption (MKHE) scheme can homomorphically evaluate ciphertexts encrypted by different keys, which can effectively protect the privacy information of data holders in the joint computing of cloud services.
Lingwu Li, Ruwei Huang
doaj   +1 more source

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]

open access: yes, 2013
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M.   +2 more
core   +1 more source

The Techniques for Arbitrary Secure Quering to Encrypted Cloud Database Using Fully Homomorphic Encryption

open access: yesБезопасность информационных технологий, 2017
The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers.
Filipp B. Burtyka
doaj   +1 more source

SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION

open access: yesICTACT Journal on Soft Computing, 2021
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud.
M Yogasini, B N Prathibha
doaj   +1 more source

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]

open access: yes, 2019
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B.   +5 more
core   +2 more sources

Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing

open access: yesApplied Sciences, 2022
Cloud computing has become popular in data sharing mainly because it has huge storage capacity and computing power. Securing the privacy of sensitive data for cloud-based data sharing is vital. Currently, there are various conditional proxy re-encryption
Huidan Hu   +3 more
doaj   +1 more source

A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data [PDF]

open access: yes, 2015
Smart grid provides fine-grained real time energy consumption, and it is able to improve the efficiency of energy management. It enables the collection of energy consumption data from consumer and hence has raised serious privacy concerns.
Ang, Yi Han   +2 more
core   +1 more source

Homomorphic encryption and some black box attacks

open access: yes, 2020
This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes ...
A Acar   +10 more
core   +1 more source

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV

open access: yesIraqi Journal of Information & Communication Technology, 2019
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext ...
Zainab H. Mahmood, Mahmood K. Ibrahem
doaj   +1 more source

Home - About - Disclaimer - Privacy