Results 151 to 160 of about 8,550 (197)
Some of the next articles are maybe not open access.

Can hybrid Homomorphic Encryption schemes be practical?

2016 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016
The ability to perform computations on ciphertexts without knowing any information about the plaintexts makes homomorphic encryption technique useful in a wide variety of confidentiality preserving protocols (e.g., e-voting, e-health, etc.). Unfortunately, the traditional encyption schemes support a limited number of homomorphic operations (usually ...
Khalid El Makkaoui   +2 more
openaire   +1 more source

Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption

2021
Fully Homomorphic Encryption (FHE) supports realistic computations on encrypted data and hence it is widely proposed to be used in cloud computing to protect the integrity and privacy of data stored in the cloud. The existing symmetric-based FHE schemes suffer from insecurity against known plaintext/ciphertext attacks and generate a large ciphertext ...
Kamaldeen Jimoh Muhammed   +4 more
openaire   +1 more source

A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption

IEEE Transactions on Information Forensics and Security, 2015
We introduce a hybrid homomorphic encryption that combines public-key encryption (PKE) and somewhat homomorphic encryption (SHE) to reduce the storage requirements of most somewhat or fully homomorphic encryption (FHE) applications. In this model, messages are encrypted with a PKE and computations on encrypted data are carried out using SHE or FHE ...
null Jung Hee Cheon, null Jinsu Kim
openaire   +1 more source

A Privacy Preservation Strategy Using Hybrid Fully Homomorphic Encryption Scheme in IoT

International Journal of Cooperative Information Systems, 2023
The Wireless Sensor Network affords the basis for the Internet of Things (IoT) systems that typically produce large and imprecise information. This information has to be integrated faster and efficiently handled. Various devices deployed with IoT exists like organizational automation, smart grid etc.
Anita Chaudhari, Rajesh Bansode
openaire   +1 more source

Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage

2019
Cloud computing is the budding paradigm nowadays in the macrocosm of the information processing system. It offers a variety of services for the users through the Internet and is highly cost-efficient and flexible. Information storage in the cloud is showing great attention.
Bijeta Seth, Surjeet Dalal, Raman Kumar
openaire   +1 more source

Incorporating homomorphic encryption with hybrid numerical authentication for blind computer users

2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2017
Current research on “Usable Security” provides security solutions designed without giving impotance to human disabilities. This paper focus on filling this void in the realm of blind or visually impaired computer users. More specifically, this work is towards developing an authentication technology, which is free from shoulder surfing and key board ...
S. Shailesh, H. Muhammed Ilyas
openaire   +1 more source

Towards Case-Optimized Hybrid Homomorphic Encryption

2022
Cosseron, Orel   +3 more
openaire   +2 more sources

Fast Homomorphic Encryption Based on CPU-4GPUs Hybrid System in Cloud

2018
Security is an ever-present consideration for applications and data in the cloud computing environment. As an important method of performing computations directly on encrypted data without any need of decryption and compromising privacy, homomorphic encryption is an increasingly popular topic of protecting the privacy of data in cloud security research.
Jing Xia   +3 more
openaire   +1 more source

A Hybrid Homomorphic Model with RSA Algorithm and Modified Enhanced Homomorphic Encryption Technique

2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), 2023
T P Kamatchi, K Anitha Kumari
openaire   +1 more source

Enhancing Privacy in Artificial Intelligence Services Using Hybrid Homomorphic Encryption

Babylonian Journal of Artificial Intelligence
The increasing occurrence of cyberattacks specifically aimed at critical infrastructure has led to the adoption of network intrusion detection techniques for the Internet of Things (IoT).  AI is transforming multiple sectors today, the growth of adversarial attacks on AI models and models present imperative privacy issues which hinder its larger ...
openaire   +1 more source

Home - About - Disclaimer - Privacy