Can hybrid Homomorphic Encryption schemes be practical?
2016 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016The ability to perform computations on ciphertexts without knowing any information about the plaintexts makes homomorphic encryption technique useful in a wide variety of confidentiality preserving protocols (e.g., e-voting, e-health, etc.). Unfortunately, the traditional encyption schemes support a limited number of homomorphic operations (usually ...
Khalid El Makkaoui +2 more
openaire +1 more source
Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption
2021Fully Homomorphic Encryption (FHE) supports realistic computations on encrypted data and hence it is widely proposed to be used in cloud computing to protect the integrity and privacy of data stored in the cloud. The existing symmetric-based FHE schemes suffer from insecurity against known plaintext/ciphertext attacks and generate a large ciphertext ...
Kamaldeen Jimoh Muhammed +4 more
openaire +1 more source
A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
IEEE Transactions on Information Forensics and Security, 2015We introduce a hybrid homomorphic encryption that combines public-key encryption (PKE) and somewhat homomorphic encryption (SHE) to reduce the storage requirements of most somewhat or fully homomorphic encryption (FHE) applications. In this model, messages are encrypted with a PKE and computations on encrypted data are carried out using SHE or FHE ...
null Jung Hee Cheon, null Jinsu Kim
openaire +1 more source
A Privacy Preservation Strategy Using Hybrid Fully Homomorphic Encryption Scheme in IoT
International Journal of Cooperative Information Systems, 2023The Wireless Sensor Network affords the basis for the Internet of Things (IoT) systems that typically produce large and imprecise information. This information has to be integrated faster and efficiently handled. Various devices deployed with IoT exists like organizational automation, smart grid etc.
Anita Chaudhari, Rajesh Bansode
openaire +1 more source
Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage
2019Cloud computing is the budding paradigm nowadays in the macrocosm of the information processing system. It offers a variety of services for the users through the Internet and is highly cost-efficient and flexible. Information storage in the cloud is showing great attention.
Bijeta Seth, Surjeet Dalal, Raman Kumar
openaire +1 more source
Incorporating homomorphic encryption with hybrid numerical authentication for blind computer users
2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2017Current research on “Usable Security” provides security solutions designed without giving impotance to human disabilities. This paper focus on filling this void in the realm of blind or visually impaired computer users. More specifically, this work is towards developing an authentication technology, which is free from shoulder surfing and key board ...
S. Shailesh, H. Muhammed Ilyas
openaire +1 more source
Towards Case-Optimized Hybrid Homomorphic Encryption
2022Cosseron, Orel +3 more
openaire +2 more sources
Fast Homomorphic Encryption Based on CPU-4GPUs Hybrid System in Cloud
2018Security is an ever-present consideration for applications and data in the cloud computing environment. As an important method of performing computations directly on encrypted data without any need of decryption and compromising privacy, homomorphic encryption is an increasingly popular topic of protecting the privacy of data in cloud security research.
Jing Xia +3 more
openaire +1 more source
A Hybrid Homomorphic Model with RSA Algorithm and Modified Enhanced Homomorphic Encryption Technique
2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), 2023T P Kamatchi, K Anitha Kumari
openaire +1 more source
Enhancing Privacy in Artificial Intelligence Services Using Hybrid Homomorphic Encryption
Babylonian Journal of Artificial IntelligenceThe increasing occurrence of cyberattacks specifically aimed at critical infrastructure has led to the adoption of network intrusion detection techniques for the Internet of Things (IoT). AI is transforming multiple sectors today, the growth of adversarial attacks on AI models and models present imperative privacy issues which hinder its larger ...
openaire +1 more source

