|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
|
Huifeng Fan, Ruwei Huang and Fengting Luo
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling...
ver más
|
|
|
|
|
|
|
Jestine Paul, Benjamin Hong Meng Tan, Bharadwaj Veeravalli and Khin Mi Mi Aung
Machine learning classification algorithms, such as decision trees and random forests, are commonly used in many applications. Clients who want to classify their data send them to a server that performs their inference using a trained model. The client m...
ver más
|
|
|
|
|
|
|
Shinji Ono, Jun Takata, Masaharu Kataoka, Tomohiro I, Kilho Shin and Hiroshi Sakamoto
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value ??(????)
x
(
F
i
)
and the class label ??(??)
x
(
C
)
are given for each ??...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Yuan Zhou and Tao Feng
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc...
ver más
|
|
|
|
|
|
|
Hiroki Okada, Shinsaku Kiyomoto and Carlos Cid
TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt? 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bou...
ver más
|
|
|
|
|
|
|
Ivan Chizhov,Alexandra Garazha,Ilya Gerasimov,Maxim Nikolaev
Pág. 11 - 22
Fully homomorphic encryption allows computation to be performed on encrypted data without knowing or learning the decryption key. Therefore this technology can be extremely useful for storing and processing personal data. Due to the great interest in thi...
ver más
|
|
|
|
|
|
|
Johannes Kölsch, Christopher Heinz, Axel Ratzke and Christoph Grimm
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms. The validation of such systems is a challenge and currently mostly done by prototypes. Th...
ver más
|
|
|
|
|
|
|
????????? ???????? ?????
Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th...
ver más
|
|
|
|