Showing 421 - 440 results of 498 for search '"homomorphic encryption"', query time: 0.10s Refine Results
  1. 421

    SVAT: Secure outsourcing of variant annotation and genotype aggregation by Miran Kim, Su Wang, Xiaoqian Jiang, Arif Harmanci

    Published 2022-10-01
    “…Results We present SVAT, a method for secure outsourcing of variant annotation and aggregation, which are two basic steps in variant interpretation and detection of causal variants. SVAT uses homomorphic encryption to encrypt the data at the client-side. …”
    Get full text
    Article
  2. 422

    COLLAGENE enables privacy-aware federated and collaborative genomic data analysis by Wentao Li, Miran Kim, Kai Zhang, Han Chen, Xiaoqian Jiang, Arif Harmanci

    Published 2023-09-01
    “…COLLAGENE protects data using shared-key homomorphic encryption and combines encryption with multiparty strategies for efficient privacy-aware collaborative method development. …”
    Get full text
    Article
  3. 423

    Blockchain-based privacy-preserving multi-tasks federated learning framework by Yunyan Jia, Ling Xiong, Yu Fan, Wei Liang, Neal Xiong, Fengjun Xiao

    Published 2024-12-01
    “…Second, the proposed framework combines Paillier homomorphic encryption with Pearson correlation coefficient to protect users' privacy and ensure the accuracy of global model. …”
    Get full text
    Article
  4. 424

    Encrypted machine learning of molecular quantum properties by Jan Weinreich, Guido Falk von Rudorff, O Anatole von Lilienfeld

    Published 2023-01-01
    “…However, contemporary ML models based on fully homomorphic encryption or federated learning are either too expensive for practical use or have to trade higher speed for weaker security. …”
    Get full text
    Article
  5. 425

    A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks by Xin Liu, Jianwei Kong, Lu Peng, Dan Luo, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2023-12-01
    “…In this paper, for the problem of secure computation of similarity edit distance of graphs, firstly, the encoding method applicable to the Paillier encryption algorithm is proposed, and the XOR operation scheme is proposed according to the Paillier homomorphic encryption algorithm. Then, the security algorithm under the semi-honest model is designed, which adopts the new encoding method and the XOR operation scheme. …”
    Get full text
    Article
  6. 426

    A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning by Elif Ustundag Soykan, Leyli Karacay, Ferhat Karakoc, Emrah Tomur

    Published 2022-01-01
    “…We deeply analyze Privacy Enhancing Technologies (PETs), covering secure multi-party computation (SMPC), homomorphic encryption (HE), differential privacy (DP), and confidential computing (CC) in the context of collaborative ML. …”
    Get full text
    Article
  7. 427

    A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services by Farnaz Farid, Mahmoud Elkhodr, Fariza Sabrina, Farhad Ahamed, Ergun Gide

    Published 2021-01-01
    “…In addition to relying on the unique identification characteristics of the users’ biometric traits, the security of the framework is empowered by the use of Homomorphic Encryption (HE). The use of HE allows patients’ data to stay encrypted when being processed or analyzed in the cloud. …”
    Get full text
    Article
  8. 428

    Deep learning for content-based image retrieval in FHE algorithms by Abdullah Sura Mahmood, Jaber Mustafa Musa

    Published 2023-02-01
    “…Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). …”
    Get full text
    Article
  9. 429

    Efficient Data Collaboration Using Multi-Party Privacy Preserving Machine Learning Framework by Abdu Salam, Mohammad Abrar, Faizan Ullah, Izaz Ahmad Khan, Farhan Amin, Gyu Sang Choi

    Published 2023-01-01
    “…SCLA integrates homomorphic encryption and Federated Learning (FL) to enable secure data collaboration among various stakeholders. …”
    Get full text
    Article
  10. 430

    A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System by Shuang Sun, Rong Du, Shudong Chen

    Published 2021-01-01
    “…This outweighs the advantage of using cloud computing resources. Fully homomorphic encryption (FHE) and homomorphic signature technology may be adopted to realize ciphertext computation and for correctness checking of ciphertext computation results. …”
    Get full text
    Article
  11. 431

    Structure vs. Hardness Through the Obfuscation Lens by Bitansky, Nir, Degwekar, Akshay, Vaikuntanathan, Vinod

    Published 2021
    “…For some cryptographic primitives, such as one-way permutations and homomorphic encryption, we know that the answer is yes—they imply hard problems in NP ∩ coNP and SZK, respectively. …”
    Get full text
    Article
  12. 432

    Structure Versus Hardness Through the Obfuscation Lens by Bitansky, Nir, Degwekar, Akshay, Vaikuntanathan, Vinod

    Published 2022
    “…For some cryptographic primitives, such as one-way permutations and homomorphic encryption, we know that the answer is yes-they imply hard problems in NP∩coNP and SZK, respectively. …”
    Get full text
    Article
  13. 433

    Privacy-preserving price-sensitive ranking system for online service by Ho, Yi Le

    Published 2016
    “…Paillier cryptosystem is an asymmetric partially-homomorphic encryption that uses public key for encryption and private key for decryption. …”
    Get full text
    Final Year Project (FYP)
  14. 434

    Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption by Masaki Miyamoto, Kaoru Teranishi, Keita Emura, Kiminao Kogiso

    Published 2023-01-01
    “…Encrypted control systems are secure control methods that use the cryptographic properties of a specific homomorphic encryption scheme. This study proposes a cyberattack-detectable encrypted control system and validates its effectiveness using a proportional integration derivative (PID) position-control system for an industrial motor. …”
    Get full text
    Article
  15. 435

    Algebraic Attacks on RAIN and AIM Using Equivalent Representations by Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier

    Published 2023-12-01
    “… Designing novel symmetric-key primitives for advanced protocols like secure multiparty computation (MPC), fully homomorphic encryption (FHE) and zero-knowledge proof systems (ZK), has been an important research topic in recent years. …”
    Get full text
    Article
  16. 436

    Reversible Data Hiding in Encrypted Images Based on an Adaptive Recognition Strategy for Blocks by Zhi Pang, Han Li, Zhaolin Xiao, Liansheng Sui

    Published 2023-02-01
    “…As the rapid development of third-party storage and homomorphic encryption have profoundly stimulated the desire for secure communication, reversible data hiding in encrypted images has received widespread attention, since it allows lossless data conveying and perfect image recovery. …”
    Get full text
    Article
  17. 437

    Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System by Xiao-Yu Zhang, Stefanie Kuenzel, José-Rodrigo Córdoba-Pachón, Chris Watkins

    Published 2020-06-01
    “…Moreover, some methods, such as rechargeable batteries and homomorphic encryption, require an expensive energy storage system or central processor with high computation ability, which is unrealistic for mass roll-out. …”
    Get full text
    Article
  18. 438

    Secure Collaborative Computing for Linear Regression by Albert Guan, Chun-Hung Lin, Po-Wen Chi

    Published 2023-12-01
    “…Currently, almost all homomorphic encryption schemes that support both addition and multiplication operations demand significant computational resources and can only offer computational security. …”
    Get full text
    Article
  19. 439

    Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme by Hui Zhu, Lijuan Gao, Hui Li

    Published 2016-02-01
    “…Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. …”
    Get full text
    Article
  20. 440

    Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case by Evgenia Novikova, Elena Doynikova, Sergey Golubev

    Published 2022-03-01
    “…It is explained by the application of homomorphic encryption for input data protection from different data owners or data sources. …”
    Get full text
    Article