Results 31 to 40 of about 196,760 (255)
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can ...
Juyan Li +3 more
doaj +1 more source
Abstract Representational drift is a phenomenon of increasing interest in the cognitive and neural sciences. While investigations are ongoing for other sensory cortices, recent research has demonstrated the pervasiveness in which it occurs in the piriform cortex for olfaction.
Ann‐Sophie Barwich +1 more
wiley +1 more source
Multiple to One Fully Homomorphic Encryption Algorithm Based on Integer Polynomial Ring [PDF]
Aiming at the limitation that most traditional public key encryption mode can only send messages from a single sender to a single receiver,a one to one homomorphic encryption algorithm based on integer polynomial ring is designed based on integer ...
WANG Caifen,ZHAO Bing,LIU Chao,CHENG Yudan,XU Qinbai
doaj +1 more source
FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System [PDF]
Federated Learning trains machine learning models on distributed devices by aggregating local model updates instead of local data. However, privacy concerns arise as the aggregated local models on the server may reveal sensitive personal information by ...
Weizhao Jin +6 more
semanticscholar +1 more source
AbstractHomomorphic encryption is a technique in cryptography that allows for performing operations on encrypted data. The encrypted result can then be decrypted to obtain the operation result, making it possible to perform computations on sensitive data without revealing it.
+5 more sources
Achieving GWAS with homomorphic encryption [PDF]
Abstract Background One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This raises privacy and security concerns as these genetic markers can be used to identify individuals uniquely.
Jun Jie Sim +4 more
openaire +4 more sources
Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj +1 more source
Homomorphic encryption (HE) is a cryptosystem that allows the secure processing of encrypted data. One of the most popular HE schemes is the Brakerski-Fan-Vercauteren (BFV), which supports somewhat (SWHE) and fully homomorphic encryption (FHE). Since overly involved arithmetic operations of HE schemes are amenable to concurrent computation, GPU devices
Ali Şah Özcan +3 more
openaire +4 more sources
BTS: an accelerator for bootstrappable fully homomorphic encryption [PDF]
Homomorphic encryption (HE) enables the secure offloading of computations to the cloud by providing computation on encrypted data (ciphertexts). HE is based on noisy encryption schemes in which noise accumulates as more computations are applied to the ...
Sangpyo Kim +6 more
semanticscholar +1 more source
Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj +1 more source

