Results 31 to 40 of about 24,321 (191)
Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping
Multi-key Homomorphic Encryption (MKHE) scheme can homomorphically evaluate ciphertexts encrypted by different keys, which can effectively protect the privacy information of data holders in the joint computing of cloud services.
Lingwu Li, Ruwei Huang
doaj +1 more source
Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M. +2 more
core +1 more source
The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers.
Filipp B. Burtyka
doaj +1 more source
SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud.
M Yogasini, B N Prathibha
doaj +1 more source
Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B. +5 more
core +2 more sources
Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
Cloud computing has become popular in data sharing mainly because it has huge storage capacity and computing power. Securing the privacy of sensitive data for cloud-based data sharing is vital. Currently, there are various conditional proxy re-encryption
Huidan Hu +3 more
doaj +1 more source
A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data [PDF]
Smart grid provides fine-grained real time energy consumption, and it is able to improve the efficiency of energy management. It enables the collection of energy consumption data from consumer and hence has raised serious privacy concerns.
Ang, Yi Han +2 more
core +1 more source
Homomorphic encryption and some black box attacks
This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes ...
A Acar +10 more
core +1 more source
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj +2 more sources
HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext ...
Zainab H. Mahmood, Mahmood K. Ibrahem
doaj +1 more source

