搜索结果: 16-30 共查到“军事学 Homomorphic encryption”相关记录208条 . 查询时间(0.064 秒)
Homomorphic Encryption for Finite Automata
Finite Automata Inhomogeneous NTRU Homomorphic Encryption
2019/3/1
We describe a somewhat homomorphic GSW-like encryption scheme, natively encrypting matrices rather than just single elements. This scheme offers much better performance than existing homomorphic encry...
Fully homomorphic encryption modulo Fermat numbers
public-key cryptography Fully Homomorphic Encryption
2019/3/1
In this paper, we recast state-of-the-art constructions for fully homomorphic encryption in the simple language of arithmetic modulo large Fermat numbers. The techniques used to construct our scheme a...
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
implementation public-key cryptography RNS variant of approximate homomorphic encryption genome-wide associate studies
2019/2/28
Genome-Wide Association Studies (GWAS) refer to observational studies of a genome-wide set of genetic variants across many individuals to see if any genetic variants are associated with a certain trai...
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
fully homomorphic encryption logistic regression genome privacy
2019/2/27
Background Privacy-preserving computations on genomic data, and more generally on medical data, is a critical path technology for innovative, life-saving research to positively and equally impact the ...
Achieving GWAS with Homomorphic Encryption
GWAS Homomorphic Encryption Logistic Regression
2019/2/26
One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This rais...
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
homomorphic encryption GWAS Fisher scoring
2019/2/25
One of three tasks in a secure genome analysis competition called IDASH 2018 was to develop a solution for privacy-preserving GWAS computation based on homomorphic encryption. The scenario is that a d...
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
cryptographic protocols Somewhat Homomorphic Encryption
2019/2/25
Recently, Cramer et al. (CRYPTO 2018) presented a protocol, SPDZ2k, for actively secure multiparty computation for dishonest majority in the pre-processing model over the ring Z2kZ2k, instead of over ...
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
Multi-key fully homomorphic encryption (MKFHE) NTRU two-round MPC
2019/1/4
Multi-key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users (public keys), and the results can be jointly decrypted using the secret keys of all the ...
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
quantum cryptography quantum encryption delegated quantum computation
2018/12/20
Quantum homomorphic encryption (QHE) is an important cryptographic technology for delegated quantum computation. It enables remote Server performing quantum computation on encrypted quantum data, and ...
A Full RNS Variant of Approximate Homomorphic Encryption
Approximate Homomorphic Encryption Residue Number System
2018/11/8
The technology of homomorphic encryption has improved rapidly in a few years. The cutting edge implementations are efficient enough to use in practical applications. Recently, Cheon et al. (ASIACRYPT'...
Approximate Homomorphic Encryption over the Conjugate-invariant Ring
ring learning with errors homomorphic encryption real number arithmetic
2018/11/6
The Ring Learning with Errors (RLWE) problem over a cyclotomic ring has been the most widely used hardness assumption for the construction of practical homomorphic encryption schemes. However, this re...
Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets
secure search secure report fully homomorphic encryption
2018/11/5
emph{Secure Report} is the problem of retrieving from a database table (e.g. on the cloud) all records matching specified attributes, as in SQL SELECT queries, but where the query and possibly the dat...
Integer Matrices Homomorphic Encryption and Its application
integer matrices encryption implementation application
2018/11/2
We construct an integer matrices encryption scheme based on binary matrices encryption scheme proposed in [9], and support homomorphic addition and multiplication operations, we prove the correctness ...
Conditionals in Homomorphic Encryption and Machine Learning Applications
Homomorphic encryption conditionals clashes with fundamental encryption requirements
2018/11/2
Homomorphic encryption has the purpose to allow computations on encrypted data, without the need for decryption other than that of the final result. This could provide an elegant solution to the probl...
Improved Bootstrapping for Approximate Homomorphic Encryption
Fully Homomorphic Encryption Bootstrapping
2018/11/2
Since Cheon et al. introduced a homomorphic encryption scheme for approximate arithmetic (Asiacrypt ’17), it has been recognized as suitable for important real-life usecases of homomorphic encryption,...