-
141
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data
Published 2024-02-01Subjects: Get full text
Article -
142
Privacy-preserving association rule mining via multi-key fully homomorphic encryption
Published 2023-02-01Subjects: Get full text
Article -
143
The Techniques for Arbitrary Secure Quering to Encrypted Cloud Database Using Fully Homomorphic Encryption
Published 2017-06-01Subjects: Get full text
Article -
144
Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment
Published 2022-04-01“…For resolving the limitations of the existing works, this article proposes an optimal multikey homomorphic encryption with steganography approach for multimedia security (OMKHES-MS) technique in the IoE environment. …”
Get full text
Article -
145
Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error
Published 2023-01-01Subjects: “…Homomorphic encryption (HE)…”
Get full text
Article -
146
Cloud-Assisted Privacy Protection Energy Trading Based on IBS and Homomorphic Encryption in IIoT
Published 2022-09-01Subjects: Get full text
Article -
147
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product
Published 2023-12-01Subjects: Get full text
Article -
148
Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption
Published 2023-04-01Subjects: Get full text
Article -
149
Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
Published 2022-08-01Subjects: “…fully homomorphic encryption…”
Get full text
Article -
150
Guidelines for Secure Process Control: Harnessing the Power of Homomorphic Encryption and State Feedback Control
Published 2023-01-01Subjects: Get full text
Article -
151
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods
Published 2024-03-01Subjects: Get full text
Article -
152
Making Computation on Encrypted Data Practical through Hardware Acceleration of Fully Homomorphic Encryption
Published 2022“…Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers with cryptographic privacy. …”
Get full text
Thesis -
153
A Tensor Compiler with Automatic Data Packing for Simple and Efficient Fully Homomorphic Encryption
Published 2024“…Fully Homomorphic Encryption (FHE) enables computing on encrypted data, letting clients securely offload computation to untrusted servers. …”
Get full text
Article -
154
Private genomes and public SNPs: homomorphic encryption of genotypes and phenotypes for shared quantitative genetics
Published 2020“…Here, we present a method of homomorphic encryption that obscures individuals’ genotypes and phenotypes, and is suited to quantitative genetic association analysis. …”
Journal article -
155
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Article -
156
Enhanced fully homomorphic encryption scheme using modified key generation for cloud environment
Published 2020“…Fully homomorphic encryption (FHE) is a special class of encryption that allows performing unlimited mathematical operations on encrypted data without decrypting it. …”
Get full text
Thesis -
157
A Novel Reversible Data Hiding Method for 3D Model in Homomorphic Encryption Domain
Published 2021-06-01Subjects: Get full text
Article -
158
Cyclic Homomorphic Encryption Aggregation (CHEA)—A Novel Approach to Data Aggregation in the Smart Grid
Published 2024-02-01Subjects: Get full text
Article -
159
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption
Published 2022-09-01“…Abstract Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric comparison. …”
Get full text
Article -
160
Enhanced Secure Storage of Big Data at Rest with Improved ECC and Paillier Homomorphic Encryption Algorithms
Published 2024-01-01Subjects: Get full text
Article