搜索结果: 121-135 共查到“军事学 Homomorphic encryption”相关记录208条 . 查询时间(0.05 秒)
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Non-commutative rings Noise-free Symmetric-FHE Verifiable FHE
2015/12/29
A framework of noise-free symmetric fully homomorphic encryption (FHE) is proposed in this work. Dierent from the frameworks that are dened over non-commutative groups, our framework is constructed ...
Fully Homomorphic Encryption on Octonion Ring
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis,
2015/12/24
In previous work I proposed a fully homomorphic
encryption without bootstrapping which has the weak point in the
enciphering function. In this paper I propose the improved fully
homomorphic encrypt...
cuHE: A Homomorphic Encryption Accelerator Library
Homomorphic evaluation GPU acceleration large polynomial arithmetic
2015/12/23
We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes
defined over polynomial rings enabled with a number of optimizations including algebraic techniques
for efficient e...
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
homomorphic encryption lattice-based cryptography
2015/12/23
We give a theoretical description of a new homomorphic encryption
scheme DA-Encrypt that is based on (non-archimedean) Diophantine
Approximation.
The purpose of this paper is to compare side-by-side the NTRU and
BGV schemes in their non-scale invariant (messages in the lower bits), and their
scale invariant (message in the upper bits) forms. ...
Private Genome Analysis through Homomorphic Encryption
Homomorphic encryption Genome-wide association studies Hamming distance
2015/12/22
The rapid development of genome sequencing technology allows researchers to access
large genome datasets. However, outsourcing the data processing to the cloud poses high risks
for personal privacy....
Fully Homomorphic Encryption with Composite Number Modulus
fully homomorphic encryption multivariate algebraic equation Gr鯾ner basis
2015/12/22
Gentry抯 bootstrapping technique is the most famous method
of obtaining fully homomorphic encryption. In previous work I proposed a
fully homomorphic encryption without bootstrapping which has the we...
A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE
Fully Homomorphic Encryption Public Key Encryption Multi-Bit Plaintext
2015/12/21
The efficiency of fully homomorphic encryption is a big question at present. To improve efficiency of fully homomorphic encryption,
we use the technique of packed ciphertext to construct a multi-bit ...
Lattice Attacks on the DGHV Homomorphic Encryption Scheme
Homomorphic Encryption Cryptanalysis Lattice reduction
2015/12/21
In 2010, van Dijk, Gentry, Halevi, and Vaikuntanathan described
the first fully homomorphic encryption over the integers, called
DGHV. The scheme is based on a set of m public integers ci = pqi + ri...
A Guide to Fully Homomorphic Encryption
public-key cryptography Fully Homomorphic Encryption Applications of (Fully) Homomorphic Encryption
2015/12/18
Fully homomorphic encryption (FHE) has been dubbed the holy grail
of cryptography, an elusive goal which could solve the IT world’s problems
of security and trust. Research in the area exploded afte...
An Investigation of Complex Operations with Word-Size Homomorphic Encryption
Homomorphic encryption word-size comparison
2015/12/18
Homomorphic encryption has progressed rapidly in both effi-
ciency and versatility since its emergence in 2009. Meanwhile, a multitude
of pressing privacy needs ?ranging from cloud computing to heal...
We construct the first leakage resilient variants of fully homomorphic encryption (FHE) schemes. Our leakage model is bounded adaptive leakage resilience. We first construct a leakage- resilient level...
A fast integer-based batch full-homomorphic encryption scheme over finite field
full-homomorphic integer-based
2014/3/5
In view of the problems that the plaintext space is too small in the existing schemes. In this paper, a new improved scheme is presented by improving the DGHV scheme. The plaintext space of the improv...
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
Fully Homomorphic Encryption FPGA
2014/3/7
A fully homomorphic encryption (FHE) scheme is envisioned as being a key cryptographic tool in building a secure and reliable cloud computing environment, as it allows arbitrarily evaluation of a ciph...
Private Database Queries Using Somewhat Homomorphic Encryption
private database queries somewhat homomorphic encryption
2014/3/12
In a private database query system, a client issues queries to a database and obtains the results without learning anything else about the database and without the server learning the query. While pre...