Results 1 to 10 of about 8,550 (197)
Secure searching of biomarkers through hybrid homomorphic encryption scheme [PDF]
Background As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research.
Miran Kim, Yongsoo Song, Jung Hee Cheon
doaj +6 more sources
Pasta: A Case for Hybrid Homomorphic Encryption [PDF]
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth requirements when using homomorphic encryption (HE) at the cost of more expensive computations in the encrypted domain.
Christoph Dobraunig +5 more
doaj +2 more sources
A data privacy protection method for infectious disease prediction models with balanced training speed and accuracy [PDF]
The application of deep learning technologies in constructing infectious disease prediction models has significantly enhanced public health strategies; however, the imperative for medical data privacy often prevents institutions from sharing diverse ...
Xinhang Wang +9 more
doaj +2 more sources
Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm ...
Dani Elias Mfungo, Xianping Fu
doaj +3 more sources
Research on privacy information retrieval model based on hybrid homomorphic encryption
The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is relatively low.
Wei-tao Song +3 more
doaj +2 more sources
LSTM guided homomorphic encryption for threat-resistant IoT networks [PDF]
The rapid growth of the Internet of Things (IoT) has led to revolutionary innovations in many fields; however, it has also resulted in significant security and privacy issues due to the resource limitations and distributed nature of IoT networks ...
Sanjeev Kumar +5 more
doaj +2 more sources
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs [PDF]
A non-interactive zero-knowledge (NIZK) proof can be used to demonstrate the truth of a statement without revealing anything else. It has been shown under standard cryptographic assumptions that NIZK proofs of membership exist for all languages in NP ...
Gentry, C +5 more
core +5 more sources
MedShieldFL-a privacy-preserving hybrid federated learning framework for intelligent healthcare systems [PDF]
Recent advances in artificial intelligence have greatly increased the accuracy of computer-assisted diagnosis for serious conditions including brain tumours.
Dileep Kumar Murala +3 more
doaj +2 more sources
Efficient face information encryption and verification scheme based on full homomorphic encryption [PDF]
Emerging global privacy mandates enforce strict requirements for biometric data protection, requiring encrypted processing throughout storage and computation phases.
Yijia Chen +7 more
doaj +2 more sources
Convolutional neural network (CNN) inference using fully homomorphic encryption (FHE) is a promising private inference (PI) solution due to the capability of FHE that enables offloading the whole computation process to the server while protecting the ...
Donghwan Kim +4 more
doaj +3 more sources

