Results 51 to 60 of about 196,760 (255)

Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping

open access: yesMathematics, 2023
Multi-key Homomorphic Encryption (MKHE) scheme can homomorphically evaluate ciphertexts encrypted by different keys, which can effectively protect the privacy information of data holders in the joint computing of cloud services.
Lingwu Li, Ruwei Huang
doaj   +1 more source

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]

open access: yes, 2019
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B.   +5 more
core   +2 more sources

The Techniques for Arbitrary Secure Quering to Encrypted Cloud Database Using Fully Homomorphic Encryption

open access: yesБезопасность информационных технологий, 2017
The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers.
Filipp B. Burtyka
doaj   +1 more source

Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation [PDF]

open access: yes, 2013
The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising ...
Barni, M.   +2 more
core   +1 more source

SECURE ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATA USING FULLY HOMOMORPHIC ENCRYPTION

open access: yesICTACT Journal on Soft Computing, 2021
Cloud Computing is a leading innovation technology that guides to access applications over the web. The data owner’s data can be gotten to and controlled in the cloud.
M Yogasini, B N Prathibha
doaj   +1 more source

Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing

open access: yesApplied Sciences, 2022
Cloud computing has become popular in data sharing mainly because it has huge storage capacity and computing power. Securing the privacy of sensitive data for cloud-based data sharing is vital. Currently, there are various conditional proxy re-encryption
Huidan Hu   +3 more
doaj   +1 more source

A survey on implementations of homomorphic encryption schemes

open access: yesJournal of Supercomputing, 2023
With the increased need for data confidentiality in various applications of our daily life, homomorphic encryption (HE) has emerged as a promising cryptographic topic.
Thi Van Thao Doan   +3 more
semanticscholar   +1 more source

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV

open access: yesIraqi Journal of Information & Communication Technology, 2019
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext ...
Zainab H. Mahmood, Mahmood K. Ibrahem
doaj   +1 more source

A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data [PDF]

open access: yes, 2015
Smart grid provides fine-grained real time energy consumption, and it is able to improve the efficiency of energy management. It enables the collection of energy consumption data from consumer and hence has raised serious privacy concerns.
Ang, Yi Han   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy