Results 41 to 50 of about 8,550 (197)

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Making Sigma-Protocols Non-interactive Without Random Oracles [PDF]

open access: yes, 2015
Damg˚ard, Fazio and Nicolosi (TCC 2006) gave a transformation of Sigma-protocols, 3-move honest verifier zero-knowledge proofs, into efficient non-interactive zero-knowledge arguments for a designated verifier.
A Fiat   +19 more
core   +1 more source

Lifecycle‐Based Governance to Build Reliable Ethical AI Systems

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley   +1 more source

XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The CKKS scheme is traditionally recognized for approximate homomorphic encryption of real numbers, but BLEACH (Drucker et al., JoC 2024) extends its capabilities to handle exact computations on binary or small integer numbers. Despite this advancement,
Chao Niu   +6 more
doaj   +1 more source

Accelerated Multi-Key Homomorphic Encryption via Automorphism-Based Circuit Bootstrapping

open access: yesIEEE Access
In FHEW-like bootstrapping, blind rotation is based on the CMUX Gate (The CMux gate is a controlled selector gate that uses a control input to choose between two data inputs for the output), and blind rotation based on automorphism (A bijective ...
Kangwei Xu, Ruwei Huang
doaj   +1 more source

Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol

open access: yesIEEE Access, 2019
Multi-key full homomorphic encryption (MKFHE) can perform arbitrary operations on encrypted data under different public keys (users), and the final ciphertext can be jointly decrypted by all involved users.
Ningbo Li   +5 more
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Secure multi-party computation and homomorphic encryption are two primary security primitives in privacy-preserving machine learning, whose wide adoption is, nevertheless, constrained by the computation and network communication overheads.
Ziyuan Liang   +6 more
doaj   +1 more source

Privacy-enhanced data compression using quantum zk-SNARKs and variational auto-encoders in cloud-IoT based healthcare sensor data for medical applications [PDF]

open access: yesAIP Advances
The increasing rate of growth of the Internet of Things (IoT) in cloud-hospitality health has brought in data storage, transmission, and security challenges with the advent of quantum-enabled threats.
Rajasekaran P   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy