A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
Making Sigma-Protocols Non-interactive Without Random Oracles [PDF]
Damg˚ard, Fazio and Nicolosi (TCC 2006) gave a transformation of Sigma-protocols, 3-move honest verifier zero-knowledge proofs, into efficient non-interactive zero-knowledge arguments for a designated verifier.
A Fiat +19 more
core +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering
The CKKS scheme is traditionally recognized for approximate homomorphic encryption of real numbers, but BLEACH (Drucker et al., JoC 2024) extends its capabilities to handle exact computations on binary or small integer numbers. Despite this advancement,
Chao Niu +6 more
doaj +1 more source
Accelerated Multi-Key Homomorphic Encryption via Automorphism-Based Circuit Bootstrapping
In FHEW-like bootstrapping, blind rotation is based on the CMUX Gate (The CMux gate is a controlled selector gate that uses a control input to choose between two data inputs for the output), and blind rotation based on automorphism (A bijective ...
Kangwei Xu, Ruwei Huang
doaj +1 more source
Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol
Multi-key full homomorphic encryption (MKFHE) can perform arbitrary operations on encrypted data under different public keys (users), and the final ciphertext can be jointly decrypted by all involved users.
Ningbo Li +5 more
doaj +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning
Secure multi-party computation and homomorphic encryption are two primary security primitives in privacy-preserving machine learning, whose wide adoption is, nevertheless, constrained by the computation and network communication overheads.
Ziyuan Liang +6 more
doaj +1 more source
Privacy-enhanced data compression using quantum zk-SNARKs and variational auto-encoders in cloud-IoT based healthcare sensor data for medical applications [PDF]
The increasing rate of growth of the Internet of Things (IoT) in cloud-hospitality health has brought in data storage, transmission, and security challenges with the advent of quantum-enabled threats.
Rajasekaran P +2 more
doaj +1 more source

