Results 31 to 40 of about 5,467 (189)

Efficient Privacy‐Preserving Fingerprint‐Based Authentication System Using Fully Homomorphic Encryption

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
To help smartphone users protect their phone, fingerprint‐based authentication systems (e.g., Apple’s Touch ID) have increasingly become popular in smartphones. In web applications, however, fingerprint‐based authentication is still rarely used. One of the most serious concerns is the lack of technology for securely storing fingerprint data used for ...
Taeyun Kim   +3 more
wiley   +1 more source

SecureBP from Homomorphic Encryption

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
We present a secure backpropagation neural network training model (SecureBP), which allows a neural network to be trained while retaining the confidentiality of the training data, based on the homomorphic encryption scheme. We make two contributions.
Qinju Liu   +6 more
wiley   +1 more source

Privacy-Preserving Feature Selection with Fully Homomorphic Encryption

open access: yesAlgorithms, 2022
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value x(Fi) and the class label x(C) are given for each x∈D and Fi∈F. For a triple (
Shinji Ono   +5 more
doaj   +1 more source

Theoretical and Experimental Investigations of a Passively Mode-Locked Nd" Glass Laser [PDF]

open access: yes, 1981
The presented theoretical model for a mode-locked Nd-glass laser simultaneously takes into account dynamics of the mode-locking dye, amplification saturation and radiation background.
Kolmeder, Christian, Zinth, Wolfgang
core   +1 more source

SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search [PDF]

open access: yes, 2020
The $k$-Nearest Neighbor Search ($k$-NNS) is the backbone of several cloud-based services such as recommender systems, face recognition, and database search on text and images.
Chen, Hao   +5 more
core   +1 more source

Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping

open access: yesMathematics, 2023
Multi-key Homomorphic Encryption (MKHE) scheme can homomorphically evaluate ciphertexts encrypted by different keys, which can effectively protect the privacy information of data holders in the joint computing of cloud services.
Lingwu Li, Ruwei Huang
doaj   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The functional bootstrap in FHEW/TFHE allows for fast table lookups on ciphertexts and is a powerful tool for privacy-preserving computations. However, the functional bootstrap suffers from two limitations: the negacyclic constraint of the lookup table (
Shihe Ma   +4 more
doaj   +1 more source

First results of CMS RPC performance at 13 TeV

open access: yes, 2016
The muon spectrometer of the CMS (Compact Muon Solenoid) experiment at the Large Hadron Collider (LHC) is equipped with a redundant system made of Resistive Plate Chambers (RPCs) and Drift Tube (DT) chambers in the barrel, RPC and Cathode Strip Chambers (
Pedraza-Morales, M. I.   +2 more
core   +1 more source

A Bitwise Design and Implementation for Privacy‐Preserving Data Mining: From Atomic Operations to Advanced Algorithms

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
Homomorphic encryption (HE) is considered as one of the most powerful solutions to securely protect clients’ data from malicious users and even severs in the cloud computing. However, though it is known that HE can protect the data in theory, it has not been well utilized because many operations of HE are too slow, especially multiplication.
Baek Kyung Song   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy