-
461
An Efficient Method for Comparing Numbers and Determining the Sign of a Number in RNS for Even Ranges
Published 2022-01-01“…Fully Homomorphic Encryption (FHE) permits processing information in the form of ciphertexts without decryption. …”
Get full text
Article -
462
Obfuscation of Probabilistic Circuits and Applications
Published 2021“…In particular, we first give a general and natural methodology to achieve fully homomorphic encryption (FHE) from variants of pIO and of semantically secure encryption schemes. …”
Get full text
Article -
463
Secure Discovery of Genetic Relatives across Large-Scale and Distributed Genomic Datasets
Published 2024“…To guarantee privacy, we introduce an efficient algorithm based on multiparty homomorphic encryption (MHE) to allow data holders to cooperatively compute the relatedness coefficients between individuals, and to further classify their degrees of relatedness, all without sharing any private data. …”
Get full text
Get full text
Thesis -
464
Towards an interpreter for efficient encrypted computation
Published 2014“…Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs. …”
Get full text
Get full text
Get full text
Get full text
Article -
465
HCDA: Efficient Pairing-Free Homographic Key Management for Dynamic Cross-Domain Authentication in VANETs
Published 2020-06-01“…Please note that RSUs are assumed to be semi-trustworthy entity in our design, where critical vehicular keying messages remain secrecy. Homomorphic encryption design is applied for all involved RSUs and vehicles. …”
Get full text
Article -
466
Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives
Published 2023-06-01“… Motivated by new applications such as secure Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), many MPC-, FHE- and ZK-friendly symmetric-key primitives that minimize the< number of multiplications over Fp for a large prime p have been recently proposed in the literature. …”
Get full text
Article -
467
Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification
Published 2022-12-01“…State-of-the-art privacy-preserving ANN schemes often use full homomorphic encryption which result in a substantial overhead of computation and data traffic for the data owners, and are restricted to approximation models by low-degree polynomials which lead to a large accuracy loss of the trained model compared to the original ANN model in the plain domain. …”
Get full text
Article -
468
Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp
Published 2022-09-01“… Motivated by new applications such as secure Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), many MPC-, FHE- and ZK-friendly symmetric-key primitives that minimize the number of multiplications over Fp for a large prime p have been recently proposed in the literature. …”
Get full text
Article -
469
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
Get full text
Article -
470
A efficient and robust privacy-preserving framework for cross-device federated learning
Published 2023-02-01“…Abstract To ensure no private information is leaked in the aggregation phase in federated learning (FL), many frameworks use homomorphic encryption (HE) to mask local model updates. However, the heavy overheads of these frameworks make them unsuitable for cross-device FL, where the clients are a huge number of mobile and edge devices with limited computing resources. …”
Get full text
Article -
471
Secure k -ish Nearest Neighbors Classifier
Published 2021“…In this work we present a classifier based on <jats:italic>k</jats:italic>NN, that is more efficient to implement with homomorphic encryption (HE). The efficiency of our classifier comes from a relaxation we make to consider <jats:italic>κ</jats:italic> nearest neighbors for <jats:italic>κ ≈k</jats:italic> with probability that increases as the statistical distance between Gaussian and the distribution of the distances from <jats:italic>q</jats:italic> to <jats:italic>S</jats:italic> decreases. …”
Get full text
Article -
472
Advancing SCRAM: Privacy-Centric Approaches in Cyber Risk Measurement
Published 2024“…The framework, through the use of Multi-Party Computation (MPC) and Homomorphic Encryption (HE), guarantees each party that their participation in the computation is confidential and that the aggregated results will not be decrypted without their authorization [1]. …”
Get full text
Thesis -
473
Identifying and exploiting structures for reliable deep learning
Published 2021“…Then we propose the use of a Fully Homomorphic Encryption [84] scheme which can be used with a Binary neural network [61], along with a set of algebraic and computational tricks, to satisfy all our conditions for EPAAS while being computationally efficient.…”
Thesis -
474
Designing and Implementing a Privacy Preserving Record Linkage Protocol
Published 2018-09-01“…Results Brain-CODE Link allows a deterministic linkage between encrypted identifiers (OHIP numbers), without revealing participant identity. The same homomorphic encryption algorithm applied to identifiers upon entry to Brain-CODE, is applied to relevant identifiers within ICES data holdings. …”
Get full text
Article -
475
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Published 2024-03-01“… Fully homomorphic encryption (FHE) is an advanced cryptography technique to allow computations (i.e., addition and multiplication) over encrypted data. …”
Get full text
Article -
476
On Deniable Computation and Sublinear Graph Algorithms
Published 2023“…We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LWE) polynomial hardness assumption. …”
Get full text
Thesis -
477
Practical Cryptographically Private and Verifiable Computation through Hardware-Software Co-Design
Published 2024“…Fully Homomorphic Encryption (FHE) and Verifiable Computation (VC) enable offloading computation to untrusted servers with cryptographic privacy and integrity guarantees. …”
Get full text
Thesis -
478
Ascend : an architecture for performing secure computation on encrypted data
Published 2013Get full text
Thesis -
479
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. The secure node authentication algorithm prevents attacks from accessing the network. …”
Article -
480