Results 41 to 50 of about 196,760 (255)
Dodrant-Homomorphic Encryption for Cloud Databases using Table Lookup [PDF]
Users of large commercial databases increasingly want to outsource their database operations to a cloud service providers, but guaranteeing the privacy of data in an outsourced database has become the major obstacle to this move.
Schwarz, Thomas
core +2 more sources
Survey on Application of Homomorphic Encryption in Deep Learning [PDF]
With the widespread application of deep learning in various fields, data privacy and security issues have become increasingly important. Homomorphic encryption, a technique that allows computations to be performed directly on encrypted data, offers a ...
YANG Hongchao, YI Mengjun, LI Peijia, ZHANG Hanwen, SHEN Furao, ZHAO Jian, WANG Liuwang
doaj +1 more source
Multikey Verifiable Homomorphic Encryption
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj +1 more source
Classical Homomorphic Encryption for Quantum Circuits [PDF]
We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys. The scheme allows a classical client to blindly delegate a quantum computation to a quantum server: an honest server is able to run the computation
Mahadev, Urmila
core +2 more sources
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system.
Ogburn, Monique +2 more
openaire +1 more source
Limitations on information-theoretically-secure quantum homomorphic encryption [PDF]
Homomorphic encryption is a form of encryption which allows computation to be carried out on the encrypted data without the need for decryption. The success of quantum approaches to related tasks in a delegated computation setting has raised the question
A. Broadbent +18 more
core +2 more sources
Cyber physical system (CPS) is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components, the development of cyber physical systems is constrained by security and ...
Zhaoe Min +4 more
doaj +1 more source
An overview of torus fully homomorphic encryption [PDF]
The homomorphic encryption allows us to operate on encrypted data, making any action less vulnerable to hacking. The implementation of a fully homomorphic cryptosystem has long been impracticable. A breakthrough was achieved only in 2009 thanks to Gentry
Maria Ferrara +2 more
doaj +1 more source
SHARP: A Short-Word Hierarchical Accelerator for Robust and Practical Fully Homomorphic Encryption
Fully homomorphic encryption (FHE) is an emerging cryptographic technology that guarantees the privacy of sensitive user data by enabling direct computations on encrypted data.
Jongmin Kim +5 more
semanticscholar +1 more source
Provable Data Possession using Additive Homomorphic Encryption
Efficiency, public verification, and robustness are essential characteristics of data possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) schemes is possible due to homomorphic encryption, which is used to verify the ...
Parth Shah, Priteshkumar Prajapati
doaj +1 more source

