搜索结果: 76-90 共查到“军事学 Homomorphic encryption”相关记录208条 . 查询时间(0.083 秒)
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes
Lattice-based Cryptography Homomorphic Encryption FV
2016/5/26
Since Gentry's breakthrough work in 2009, homomorphic cryptography has received a widespread attention. Implementation of a fully homomorphic cryptographic scheme is however still highly expensive. So...
Fully Homomorphic Encryption with Isotropic Elements
fully homomorphic encryption isotropic octonion multivariate algebraic equation
2016/5/17
In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the enciphering function. In this paper I propose the fully homomorphic encryption scheme w...
SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme
Homomorphic Encryption FHE NTRU
2016/5/9
Sharing the medical records of individuals among healthcare providers and researchers around the world can accelerate advances in medical research. While the idea seems increasingly practical due to c...
Floating-Point Homomorphic Encryption
Homomorphic Encryption Floating-point Arithmetic BGV Scheme
2016/5/3
Our paper suggests a general method to construct a Floating-Point Homomorphic Encryption (FPHE) scheme that allows the floating-point arithmetics of ciphertexts, thus computing encryptions of most sig...
Partially homomorphic encryption schemes over finite fields
Homomorphic encryption q-ary functions perfect secrecy
2016/5/3
Homomorphic encryption scheme enables computation in the encrypted domain,
which is of great importance because of its wide and growing range of applications.
The main issue with the known fully (or...
Fully Homomorphic Encryption for Point Numbers
Fully homomorphic encryption FV scheme Fixed point number
2016/4/26
In this paper, based on the FV scheme, we construct a first fully homomorphic encryption scheme FHE4FX that can homomorphically compute addition and/or multiplication of encrypted fixed point numbers ...
A note on Ring-LWE security in the case of Fully Homomorphic Encryption
practical security ring-lwe fully homomorphic encryption
2016/4/18
Evaluating the practical security of Ring-LWE based cryptography has attracted
lots of efforts recently. Indeed, some differences from the standard LWE problem
enable new attacks. In this paper we d...
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Homomorphic Encryption Flattening NTRU
2016/3/23
In less than a decade fully homomorphic encryption has made significant advances. Despite all these improvements it is quite a challenge to reduce the parameter sizes and specifically evaluation keys....
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
homomorphic encryption matrix factorization gradient descent
2016/3/4
Recommendation systems become popular in our daily life. It is well known that the more
the release of users’ personal data, the better the quality of recommendation. However, such
services raise se...
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
attribute based encryption fully homomorphic encryption LWE
2016/2/23
The only known way to achieve Attribute-based Fully Homomorphic Encryption (ABFHE)
is through indistinguishability obfsucation. The best we can do at the moment without obfuscation is
Attribute-Base...
Fully homomorphic encryption must be fat or ugly?
fully homomorphic encryption characterisation
2016/2/23
In 1978, Rivest, Adleman and Dertouzos asked for algebraic
systems for which useful privacy homomorphisms exist. To date, the only
acknownledged result is noise based encryption combined with bootst...
Scalable and Secure Logistic Regression via Homomorphic Encryption
Logistic regression homomorphic encryption Paillier
2016/2/23
Logistic regression is a powerful machine learning tool to classify data. When dealing with
sensitive data such as private or medical information, cares are necessary. In this paper, we propose
a se...
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
additive homomorphic encryption adaptive chosen ciphertext attack malleability
2016/1/27
It is a well-known result that homomorphic encryption is not secure against adaptive chosen
ciphertext attacks (CCA2) because of its malleability property. Very recently, however, Gong et al. propose...
Improved Fully Homomorphic Encryption with Composite Number Modulus
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis
2016/1/27
Gentry抯 bootstrapping technique is the most famous method
of obtaining fully homomorphic encryption. In previous work I proposed
a fully homomorphic encryption without bootstrapping which has the
w...
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
secret-key cryptography FHE
2016/1/27
Brakerski showed that linearly decryptable fully homomorphic encryption
(FHE) schemes cannot be secure in the chosen plaintext attack (CPA)
model. In this paper, we show that linearly decryptable FH...