Results 41 to 50 of about 24,321 (191)

Homomorphic Encryption with Access Policies: Characterization and New Constructions

open access: yes, 2013
A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions.
Clear, Michael   +2 more
core   +1 more source

Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning

open access: yesFuture Internet, 2021
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated ...
Haokun Fang, Quan Qian
doaj   +1 more source

Medha: Microcoded Hardware Accelerator for computing on Encrypted Data

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Homomorphic encryption enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud.
Ahmet Can Mert   +6 more
doaj   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Exploring the Application and Characteristics of Homomorphic Encryption Based on Pixel Scrambling Algorithm in Image Processing

open access: yesBig Data and Cognitive Computing
Homomorphic encryption is well known to researchers, yet its application in image processing is scarce. The diversity of image processing algorithms makes homomorphic encryption implementation challenging.
Tieyu Zhao
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Frequency Shaping for Improving a Trade‐Off Between Control and Privacy Performance: Beyond Differential Privacy

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In privacy protection of control systems, a trade‐off between control performance and privacy level is often pointed out. Our goal in this paper is to improve this trade‐off by shaping the frequency of noise added for privacy protection when the control objective is to track a reference signal, which is taken as a piece of information whose ...
Rintaro Watanabe   +3 more
wiley   +1 more source

Privacy preserving distributed optimization using homomorphic encryption

open access: yes, 2018
This paper studies how a system operator and a set of agents securely execute a distributed projected gradient-based algorithm. In particular, each participant holds a set of problem coefficients and/or states whose values are private to the data owner ...
Lu, Yang, Zhu, Minghui
core   +1 more source

Initial State Privacy of Nonlinear Systems on Riemannian Manifolds

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley   +1 more source

Conditionals in Homomorphic Encryption and Machine Learning Applications [PDF]

open access: yes, 2018
Homomorphic encryption aims at allowing computations on encrypted data without decryption other than that of the final result. This could provide an elegant solution to the issue of privacy preservation in data-based applications, such as those using ...
Chialva, Diego, Dooms, Ann
core   +1 more source

Home - About - Disclaimer - Privacy