搜索结果: 61-75 共查到“军事学 Homomorphic encryption”相关记录208条 . 查询时间(0.09 秒)
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme
Homomorphic encryption Biomarkers
2017/4/5
As genome sequencing technology develops rapidly, there has lately been an increasing need to keep genomic data secure even when stored in the cloud and still used for research. In this paper, we are ...
Threshold Fully Homomorphic Encryption
Threshold Cryptography Fully Homomorphic Encryption Function Secret Sharing
2017/3/27
We formally define and give the first construction of (leveled) threshold fully homomorphic encryption for any access structure induced by a monotone boolean formula and in particular for the threshol...
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
Oblivious transfer Active adversary One-sided adaptive adversary
2017/3/13
In this article, a new oblivious transfer (OT) protocol, secure in the presence of erasure-free one-sided active adaptive adversaries is presented. The new bit OT protocol achieves better communicatio...
We propose a Somewhat Homomorphic Encryption (SHE) scheme based on the Learning With Rounding (LWR) problem. The LWR problem is somewhat similar to the more classical Learning With Errors (LWE) and wa...
In this paper, we construct {\em subring homomorphic encryption} scheme that is a homomorphic encryption scheme build on the decomposition ring, which is a subring of cyclotomic ring. In the scheme, e...
Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme
homomorphic encryption pairing-based cryptography
2017/2/20
We propose a software implementation of a variant of Boneh-Goh-Nissim scheme \cite{BGN05} with multiplicative depth 22, {whereas the original one only tackled multiplicative depth 11}. We employ toget...
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
secure outsourcing statistics fully homomorphic encryption
2016/12/29
In recent years, there has been a growing trend towards outsourcing of computational tasks with the development of cloud services. The Gentry’s pioneering work of fully homomorphic encryption (FHE) an...
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
Levelled homomorphic encryption adaptive attacks
2016/12/26
A major open problem is to protect leveled homomorphic encryption from adaptive attacks that allow an adversary to learn the private key. The only positive results in this area are by Loftus, May, Sma...
Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme ...
Two main computational problems serve as security foundations of current fully homomorphic encryption schemes: Regev's Learning With Errors problem (LWE) and Howgrave-Graham's Approximate Greatest Com...
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
Fully Homomorphic Encryption Bootstrapping Lattices
2016/12/9
In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring variants. We notice that the internal product of GSW can be replaced by a simpler external product between a GSW ...
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption
Oblivious RAM data privacy
2016/12/9
This paper proposes MSKT-ORAM, an efficient multiple server ORAM construction, to protect a client’s access pattern to outsourced data. MSKT-ORAM organizes each of the server storage as a k-ary tree a...
Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
Homomorphic Encryption public-key cryptography
2016/12/7
While the smart grid has the potential to have a positive impact on the sustainability and efficiency of the electricity market, it also poses some serious challenges with respect to the privacy of th...
Fully Homomorphic Encryption with Zero Norm Cipher Text
fully homomorphic encryption octonion factoring
2016/6/29
Gentry抯 bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak...
Quantum homomorphic encryption for polynomial-sized circuits
homomorphic encryption quantum cryptography quantum teleportation
2016/6/6
We present a new scheme for quantum homomorphic encryption which is compact and allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the framework of Broad- bent...