Results 81 to 90 of about 24,321 (191)

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

open access: yesCryptography
Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations ...
Siddhartha Siddhiprada Bhoi   +3 more
doaj   +1 more source

Secure Cloud Computing Using Homomorphic Encryption

open access: yesБезопасность информационных технологий, 2013
The question of cloud security has become more significant with growing popularity of cloud computing. This article is dedicated to fully homomorphic encryption which is one of the most promising methods to reach the necessary level of privacy.
Alexander Olegovich Zhirov   +2 more
doaj  

Leveled homomorphic encryption schemes for homomorphic encryption standard

open access: yesJournal of Mathematical Cryptology
Abstract Homomorphic encryption allows for computations on encrypted data without exposing the underlying plaintext, enabling secure and private data processing in various applications such as cloud computing and machine learning. This article presents a comprehensive mathematical foundation for three prominent homomorphic encryption ...
Shuhong Gao, Kyle Yates
openaire   +1 more source

Design of a federated learning algorithm for power big data privacy computing based on pruning technique and homomorphic encryption

open access: yesEgyptian Informatics Journal
This paper proposes a pruned homomorphic encryption-based collaborative federated learning algorithm to address the issues of non-uniform data distribution, overfitting caused by residual gradient features, and privacy leakage risks in power big data ...
Weijian Zhang   +4 more
doaj   +1 more source

Bootstrapping Homomorphic Encryption via Functional Encryption

open access: yes, 2023
Homomorphic encryption is a central object in modern cryptography, with far-reaching applications. Constructions supporting homomorphic evaluation of arbitrary Boolean circuits have been known for over a decade, based on standard lattice assumptions. However, these constructions are leveled, meaning that they only support circuits up to some a-priori ...
Bitansky, Nir, Solomon, Tomer
openaire   +4 more sources

Homomorphic Encryption: Theory & Applications

open access: yes, 2013
Book Chapter accepted for publication in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), to be published by INTECH Publishers, Croatia. Expected month of publication: June 2013.
openaire   +2 more sources

Attribute-based fully homomorphic encryption scheme over rings

open access: yesTongxin xuebao, 2017
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted ...
Yong-hui ZHENG   +3 more
doaj   +2 more sources

RLHMBC: A novel lightweight symmetric cipher supporting multiplicative homomorphism

open access: yesJournal of King Saud University: Computer and Information Sciences
Homomorphic Encryption (HE), which enables computations to be done directly on encrypted data without sacrificing privacy, has become a key technology for safe data processing in recent years.
Yara Al Haddad   +4 more
doaj   +1 more source

Innovative Homomorphic Sorting of Environmental Data in Area Monitoring Wireless Sensor Networks

open access: yesIEEE Access
In many special cases, the data collected from wireless sensor networks are stored in encrypted form to provide the required privacy. Sorting is an essential operation on any stored data for orderly presentation and fast searching.
Neeta B. Malvi, N. Shylashree
doaj   +1 more source

A comprehensive survey on secure healthcare data processing with homomorphic encryption: attacks and defenses

open access: yesDiscover Public Health
Healthcare data has risen as a top target for cyberattacks due to the rich amount of sensitive patient information. This negatively affects the potential of advanced analytics and collaborative research in healthcare.
Chian Hui Lee   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy