Results 31 to 40 of about 8,550 (197)
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei +5 more
doaj +1 more source
Efficient Fully Homomorphic Encryption from (Standard) LWE [PDF]
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m, into an encryption of any (efficient) function of that message, f(m), without knowing the secret key.
Brakerski, Zvika, Vaikuntanathan, Vinod
core +1 more source
Reusable garbled circuits and succinct functional encryption [PDF]
Garbled circuits, introduced by Yao in the mid 80s, allow computing a function f on an input x without leaking anything about f or x besides f(x). Garbled circuits found numerous applications, but every known construction suffers from one limitation: it ...
Goldwasser, Shafi +4 more
core +3 more sources
This paper presents a comparative study of various homomorphic encryption models to evaluate their qualitative and quantitative benefits and drawbacks in performing computations on encrypted data.
Aadit Shah +2 more
doaj +1 more source
Research on data security protection and risk identification technology for industrial information systems [PDF]
With the development of Industry 4.0 and smart manufacturing, industrial information systems face increasingly complex security threats, especially in data security and risk identification.
CHEN Shufan, QIAN Cheng, ZHAO Bingying, CAO Hao
doaj +1 more source
We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes ciphertexts from precomputed encrypted basis vectors using only ...
Dongfang Zhao
doaj +1 more source
Classical Homomorphic Encryption for Quantum Circuits [PDF]
We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys. The scheme allows a classical client to blindly delegate a quantum computation to a quantum server: an honest server is able to run the computation
Mahadev, Urmila
core +2 more sources
A Hybrid Approach to Privacy-Preserving Federated Learning
Federated learning facilitates the collaborative training of models without the sharing of raw data. However, recent attacks demonstrate that simply maintaining data locality during training processes does not provide sufficient privacy guarantees ...
Anwar, Ali +6 more
core +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
A Hybrid Protection Scheme for the Gait Analysis in Early Dementia Recognition
Human activity recognition (HAR) through gait analysis is a very promising research area for early detection of neurodegenerative diseases because gait abnormalities are typical symptoms of some neurodegenerative diseases, such as early dementia.
Francesco Castro +2 more
doaj +1 more source

