-
421
SVAT: Secure outsourcing of variant annotation and genotype aggregation
Published 2022-10-01“…Results We present SVAT, a method for secure outsourcing of variant annotation and aggregation, which are two basic steps in variant interpretation and detection of causal variants. SVAT uses homomorphic encryption to encrypt the data at the client-side. …”
Get full text
Article -
422
COLLAGENE enables privacy-aware federated and collaborative genomic data analysis
Published 2023-09-01“…COLLAGENE protects data using shared-key homomorphic encryption and combines encryption with multiparty strategies for efficient privacy-aware collaborative method development. …”
Get full text
Article -
423
Blockchain-based privacy-preserving multi-tasks federated learning framework
Published 2024-12-01“…Second, the proposed framework combines Paillier homomorphic encryption with Pearson correlation coefficient to protect users' privacy and ensure the accuracy of global model. …”
Get full text
Article -
424
Encrypted machine learning of molecular quantum properties
Published 2023-01-01“…However, contemporary ML models based on fully homomorphic encryption or federated learning are either too expensive for practical use or have to trade higher speed for weaker security. …”
Get full text
Article -
425
A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
Published 2023-12-01“…In this paper, for the problem of secure computation of similarity edit distance of graphs, firstly, the encoding method applicable to the Paillier encryption algorithm is proposed, and the XOR operation scheme is proposed according to the Paillier homomorphic encryption algorithm. Then, the security algorithm under the semi-honest model is designed, which adopts the new encoding method and the XOR operation scheme. …”
Get full text
Article -
426
A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning
Published 2022-01-01“…We deeply analyze Privacy Enhancing Technologies (PETs), covering secure multi-party computation (SMPC), homomorphic encryption (HE), differential privacy (DP), and confidential computing (CC) in the context of collaborative ML. …”
Get full text
Article -
427
A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services
Published 2021-01-01“…In addition to relying on the unique identification characteristics of the users’ biometric traits, the security of the framework is empowered by the use of Homomorphic Encryption (HE). The use of HE allows patients’ data to stay encrypted when being processed or analyzed in the cloud. …”
Get full text
Article -
428
Deep learning for content-based image retrieval in FHE algorithms
Published 2023-02-01“…Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). …”
Get full text
Article -
429
Efficient Data Collaboration Using Multi-Party Privacy Preserving Machine Learning Framework
Published 2023-01-01“…SCLA integrates homomorphic encryption and Federated Learning (FL) to enable secure data collaboration among various stakeholders. …”
Get full text
Article -
430
A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System
Published 2021-01-01“…This outweighs the advantage of using cloud computing resources. Fully homomorphic encryption (FHE) and homomorphic signature technology may be adopted to realize ciphertext computation and for correctness checking of ciphertext computation results. …”
Get full text
Article -
431
Structure vs. Hardness Through the Obfuscation Lens
Published 2021“…For some cryptographic primitives, such as one-way permutations and homomorphic encryption, we know that the answer is yes—they imply hard problems in NP ∩ coNP and SZK, respectively. …”
Get full text
Article -
432
Structure Versus Hardness Through the Obfuscation Lens
Published 2022“…For some cryptographic primitives, such as one-way permutations and homomorphic encryption, we know that the answer is yes-they imply hard problems in NP∩coNP and SZK, respectively. …”
Get full text
Article -
433
Privacy-preserving price-sensitive ranking system for online service
Published 2016“…Paillier cryptosystem is an asymmetric partially-homomorphic encryption that uses public key for encryption and private key for decryption. …”
Get full text
Final Year Project (FYP) -
434
Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption
Published 2023-01-01“…Encrypted control systems are secure control methods that use the cryptographic properties of a specific homomorphic encryption scheme. This study proposes a cyberattack-detectable encrypted control system and validates its effectiveness using a proportional integration derivative (PID) position-control system for an industrial motor. …”
Get full text
Article -
435
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
Published 2023-12-01“… Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems (ZK), has been an important research topic in recent years. …”
Get full text
Article -
436
Reversible Data Hiding in Encrypted Images Based on an Adaptive Recognition Strategy for Blocks
Published 2023-02-01“…As the rapid development of third-party storage and homomorphic encryption have profoundly stimulated the desire for secure communication, reversible data hiding in encrypted images has received widespread attention, since it allows lossless data conveying and perfect image recovery. …”
Get full text
Article -
437
Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System
Published 2020-06-01“…Moreover, some methods, such as rechargeable batteries and homomorphic encryption, require an expensive energy storage system or central processor with high computation ability, which is unrealistic for mass roll-out. …”
Get full text
Article -
438
Secure Collaborative Computing for Linear Regression
Published 2023-12-01“…Currently, almost all homomorphic encryption schemes that support both addition and multiplication operations demand significant computational resources and can only offer computational security. …”
Get full text
Article -
439
Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme
Published 2016-02-01“…Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. …”
Get full text
Article -
440
Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case
Published 2022-03-01“…It is explained by the application of homomorphic encryption for input data protection from different data owners or data sources. …”
Get full text
Article