Results 21 to 30 of about 5,467 (189)

Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics

open access: yesInformation, 2021
TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and ...
Hiroki Okada   +2 more
doaj   +1 more source

MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture [PDF]

open access: yes, 2020
Massively Parallel Computation (MPC) is a model of computation widely believed to best capture realistic parallel computing architectures such as large-scale MapReduce and Hadoop clusters. Motivated by the fact that many data analytics tasks performed on
Chan, T-H. Hubert   +3 more
core   +2 more sources

Privacy‐Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Logistic regression is a data statistical technique, which is used to predict the probability that an event occurs. For some scenarios where the storage capabilities and computing resources of the data owner are limited, the data owner wants to train the logistic regression model on the cloud service provider, while the high sensitivity of training ...
Xiaopeng Yu   +5 more
wiley   +1 more source

Multiparty Threshold Private Set Intersection Protocol with Low Communication Complexity

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Multiparty threshold private set intersection (MP‐TPSI) protocol allows n mutually untrusted parties P1, P2, …, Pn holding data sets A1, A2, …, An of size m respectively to jointly compute the intersection I = A1∩A2∩⋯∩An over all their private data sets only if the size of intersection is larger than (m − t), while ensuring that no other private ...
Xiaopeng Yu   +5 more
wiley   +1 more source

Compressible Multikey and Multi‐Identity Fully Homomorphic Encryption

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
With the development of new computing models such as cloud computing, user’s data are at the risk of being leaked. Fully homomorphic encryption (FHE) provides a possible way to fundamentally solve the problem. It enables a third party who does not know anything about the secret key and plaintexts to homomorphically perform any computable functions on ...
Tongchen Shen   +5 more
wiley   +1 more source

t‐BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Homomorphic encryption (HE) is notable for enabling computation on encrypted data as well as guaranteeing high‐level security based on the hardness of the lattice problem. In this sense, the advantage of HE has facilitated research that can perform data analysis in an encrypted state as a purpose of achieving security and privacy for both clients and ...
Joon Soo Yoo, Ji Won Yoon, Junggab Son
wiley   +1 more source

SoK: Fully Homomorphic Encryption over the [Discretized] Torus

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
First posed as a challenge in 1978 by Rivest et al., fully homomorphic encryption—the ability to evaluate any function over encrypted data—was only solved in 2009 in a breakthrough result by Gentry (Commun. ACM, 2010). After a decade of intense research,
Marc Joye
doaj   +3 more sources

Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption

open access: yesMathematics, 2023
With the development of cloud computing and big data, secure multi-party computation, which can collaborate with multiple parties to deal with a large number of transactions, plays an important role in protecting privacy.
Cunqun Fan   +6 more
doaj   +1 more source

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes

open access: yesJournal of Mathematical Cryptology, 2020
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then ...
Boura Christina   +3 more
doaj   +1 more source

Stress and the ecology of urban experience: Migrant mental lives in central Shanghai

open access: yesTransactions of the Institute of British Geographers, Volume 45, Issue 4, Page 862-876, December 2020., 2020
Responding to claims in urban studies and epidemiology that modern urban living negatively affects the mental health of the poor and newcomers to the city, this paper offers a different account based on an ethnography of a neighbourhood in central Shanghai, where precarious rural migrant lives unfold. Drawing on the concept of “ecologies of experience”
Ash Amin, Lisa Richaud
wiley   +1 more source

Home - About - Disclaimer - Privacy