Results 211 to 220 of about 379,633 (259)
Some of the next articles are maybe not open access.
Private-Key Fully Homomorphic Encryption for Private Classification
2018Fully homomophic encryption enables private computation over sensitive data, such as medical data, via potentially quantum-safe primitives. In this extended abstract we provide an overview of an implementation of a private-key fully homomorphic encryption scheme in a protocol for private Naive Bayes classification.
Alexander Wood +4 more
openaire +1 more source
2012
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined.
openaire +1 more source
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined.
openaire +1 more source
Key role for private health sector
Nursing Standard, 1988The private health care sector has a key role to play in caring for elderly people, the Commons Select Committee on Social Services has been told.
openaire +2 more sources
Private-Key Hidden Vector Encryption with Key Confidentiality
2009Predicate encryption is an important cryptographic primitive that has been recently studied [BDOP04, BW07, GPSW06, KSW08] and that has found wide applications. Roughly speaking, in a predicate encryption scheme the owner of the master secret key K can derive secret key $\tilde K$, for any pattern vector k .
BLUNDO, Carlo +2 more
openaire +2 more sources
A Private Key Management Scheme
2009 WASE International Conference on Information Engineering, 2009A safety private key management scheme ispresent in this paper. It uses an online assistantserver to cooperates with user device to performprivate key operation. And a light-weightbidirectional authentication is used beforepublic key algorithm that can avoid Denial ofService attack. Our scheme was more suitablefor private key operation in frequency.
Huming Gao, Xin Lv
openaire +1 more source
2017
Multi-key fully homomorphic encryption MFHE schemes allow polynomially many users without trusted setup assumptions to send their data encrypted under different FHE keys chosen by users independently of each other to an honest-but-curious server that can compute the output of an arbitrary polynomial-time computable function on this joint data and issue
Wutichai Chongchitmate, Rafail Ostrovsky
openaire +1 more source
Multi-key fully homomorphic encryption MFHE schemes allow polynomially many users without trusted setup assumptions to send their data encrypted under different FHE keys chosen by users independently of each other to an honest-but-curious server that can compute the output of an arbitrary polynomial-time computable function on this joint data and issue
Wutichai Chongchitmate, Rafail Ostrovsky
openaire +1 more source
Public and Private Key Cryptography
2021Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
openaire +1 more source
Asymmetric Encryption: Public/Private Keys
2019Asymmetric encryption is one of the most important advances in cryptographic security ever made. It underpins all of the security on the Web, in your Wi-Fi connections, and in secure email and other communication of all kinds. It is ubiquitous, but it is also subtle and easy to implement or use incorrectly, and a lack of correctness means a sometimes ...
Seth James Nielson +1 more
openaire +1 more source
Encoding Private Key in Fingerprint
2005Electronic transactions require secure electronic signature techniques, which can provide the authentication of the signing individual, non-repudiation of the signature and protection of the integrity of the document using strong cryptographic methods.
Ernő Jeges +2 more
openaire +1 more source

