Results 31 to 40 of about 196,760 (255)

A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing

open access: yesSensors, 2021
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can ...
Juyan Li   +3 more
doaj   +1 more source

The Wire Is Not the Territory: Understanding Representational Drift in Olfaction With Dynamical Systems Theory

open access: yesTopics in Cognitive Science, EarlyView., 2023
Abstract Representational drift is a phenomenon of increasing interest in the cognitive and neural sciences. While investigations are ongoing for other sensory cortices, recent research has demonstrated the pervasiveness in which it occurs in the piriform cortex for olfaction.
Ann‐Sophie Barwich   +1 more
wiley   +1 more source

Multiple to One Fully Homomorphic Encryption Algorithm Based on Integer Polynomial Ring [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the limitation that most traditional public key encryption mode can only send messages from a single sender to a single receiver,a one to one homomorphic encryption algorithm based on integer polynomial ring is designed based on integer ...
WANG Caifen,ZHAO Bing,LIU Chao,CHENG Yudan,XU Qinbai
doaj   +1 more source

FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System [PDF]

open access: yesarXiv.org, 2023
Federated Learning trains machine learning models on distributed devices by aggregating local model updates instead of local data. However, privacy concerns arise as the aggregated local models on the server may reveal sensitive personal information by ...
Weizhao Jin   +6 more
semanticscholar   +1 more source

Homomorphic Encryption

open access: yes, 2023
AbstractHomomorphic encryption is a technique in cryptography that allows for performing operations on encrypted data. The encrypted result can then be decrypted to obtain the operation result, making it possible to perform computations on sensitive data without revealing it.
  +5 more sources

Achieving GWAS with homomorphic encryption [PDF]

open access: yesBMC Medical Genomics, 2020
Abstract Background One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This raises privacy and security concerns as these genetic markers can be used to identify individuals uniquely.
Jun Jie Sim   +4 more
openaire   +4 more sources

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

Homomorphic Encryption on GPU

open access: yesIEEE Access, 2023
Homomorphic encryption (HE) is a cryptosystem that allows the secure processing of encrypted data. One of the most popular HE schemes is the Brakerski-Fan-Vercauteren (BFV), which supports somewhat (SWHE) and fully homomorphic encryption (FHE). Since overly involved arithmetic operations of HE schemes are amenable to concurrent computation, GPU devices
Ali Şah Özcan   +3 more
openaire   +4 more sources

BTS: an accelerator for bootstrappable fully homomorphic encryption [PDF]

open access: yesInternational Symposium on Computer Architecture, 2021
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by providing computation on encrypted data (ciphertexts). HE is based on noisy encryption schemes in which noise accumulates as more computations are applied to the ...
Sangpyo Kim   +6 more
semanticscholar   +1 more source

Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems

open access: yesБезопасность информационных технологий, 2021
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj   +1 more source

Home - About - Disclaimer - Privacy