Journal articles on the topic 'Somewhat homomorphic encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 journal articles for your research on the topic 'Somewhat homomorphic encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Jing, Mingyu Fan, Guangwei Wang, and Zhiyin Kong. "Simulation Study Based on Somewhat Homomorphic Encryption." Journal of Computer and Communications 02, no. 02 (2014): 109–11. http://dx.doi.org/10.4236/jcc.2014.22019.
Full textKosieradzki, Shane, Xiaofeng Zhao, Hiroaki Kawase, Yingxin Qiu, Kiminao Kogiso, and Jun Ueda. "Secure Teleoperation Control Using Somewhat Homomorphic Encryption." IFAC-PapersOnLine 55, no. 37 (2022): 593–600. http://dx.doi.org/10.1016/j.ifacol.2022.11.247.
Full textSun, Xiaoqiang, Ting Wang, Zhiwei Sun, Ping Wang, Jianping Yu, and Weixin Xie. "An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption." International Journal of Theoretical Physics 56, no. 4 (January 12, 2017): 1335–45. http://dx.doi.org/10.1007/s10773-017-3275-0.
Full textJung Hee Cheon and Jinsu Kim. "A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption." IEEE Transactions on Information Forensics and Security 10, no. 5 (May 2015): 1052–63. http://dx.doi.org/10.1109/tifs.2015.2398359.
Full textMikuš, Michal. "Experiments with the Plaintext Space in Gentry’S Somewhat Homomorphic Scheme." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 147–54. http://dx.doi.org/10.2478/v10127-012-0044-6.
Full text杨, 竞. "A Proof Based on the Somewhat Homomorphic Encryption Scheme." Software Engineering and Applications 02, no. 02 (2013): 43–46. http://dx.doi.org/10.12677/sea.2013.22008.
Full textSubramaniyaswamy, V., V. Jagadeeswari, V. Indragandhi, Rutvij H. Jhaveri, V. Vijayakumar, Ketan Kotecha, and Logesh Ravi. "Somewhat Homomorphic Encryption: Ring Learning with Error Algorithm for Faster Encryption of IoT Sensor Signal-Based Edge Devices." Security and Communication Networks 2022 (February 24, 2022): 1–10. http://dx.doi.org/10.1155/2022/2793998.
Full textBozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (April 10, 2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.
Full textSaha, Tushar Kanti, Mayank Rathee, and Takeshi Koshiba. "Efficient private database queries using ring-LWE somewhat homomorphic encryption." Journal of Information Security and Applications 49 (December 2019): 102406. http://dx.doi.org/10.1016/j.jisa.2019.102406.
Full textYasuda, Masaya, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, and Takeshi Koshiba. "New packing method in somewhat homomorphic encryption and its applications." Security and Communication Networks 8, no. 13 (January 12, 2015): 2194–213. http://dx.doi.org/10.1002/sec.1164.
Full textChen, Hu, Yupu Hu, Zhizhu Lian, Huiwen Jia, and Xu An Wang. "An Additively Homomorphic Encryption over Large Message Space." International Journal of Information Technology and Web Engineering 10, no. 3 (July 2015): 82–102. http://dx.doi.org/10.4018/ijitwe.2015070106.
Full textWei, Zhang. "A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings." International Journal of Technology and Human Interaction 12, no. 2 (April 2016): 72–82. http://dx.doi.org/10.4018/ijthi.2016040106.
Full textDuong, Dung Hoang, Pradeep Kumar Mishra, and Masaya Yasuda. "Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption." Tatra Mountains Mathematical Publications 67, no. 1 (September 1, 2016): 69–83. http://dx.doi.org/10.1515/tmmp-2016-0031.
Full textXiong, Lizhi, Danping Dong, Zhihua Xia, and Xianyi Chen. "High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption." IEEE Access 6 (2018): 60635–44. http://dx.doi.org/10.1109/access.2018.2876036.
Full textKhamsemanan, Nirattaya, Rafail Ostrovsky, and William E. Skeith. "On the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols." SIAM Journal on Discrete Mathematics 30, no. 1 (January 2016): 266–95. http://dx.doi.org/10.1137/110858835.
Full textFauzi, Prastudy, Martha Norberg Hovd, and Håvard Raddum. "On the IND-CCA1 Security of FHE Schemes." Cryptography 6, no. 1 (March 17, 2022): 13. http://dx.doi.org/10.3390/cryptography6010013.
Full textBoulila, Wadii, Manel Khazri Khlifi, Adel Ammar, Anis Koubaa, Bilel Benjdira, and Imed Riadh Farah. "A Hybrid Privacy-Preserving Deep Learning Approach for Object Classification in Very High-Resolution Satellite Images." Remote Sensing 14, no. 18 (September 16, 2022): 4631. http://dx.doi.org/10.3390/rs14184631.
Full textWamser, Markus Stefan, Stefan Rass, and Peter Schartner. "Oblivious Lookup-Tables." Tatra Mountains Mathematical Publications 67, no. 1 (September 1, 2016): 191–203. http://dx.doi.org/10.1515/tmmp-2016-0039.
Full textXiong, Lizhi, and Danping Dong. "Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion." Journal of Information Security and Applications 47 (August 2019): 78–85. http://dx.doi.org/10.1016/j.jisa.2019.04.005.
Full textLawrence, Jinsha. "Shortest Distance Queries on Encrypted Graph Data Based on GENOA." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 911–17. http://dx.doi.org/10.22214/ijraset.2022.39876.
Full textWang, Jiafan, and Sherman S. M. Chow. "Forward and Backward-Secure Range-Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 28–48. http://dx.doi.org/10.2478/popets-2022-0003.
Full textUtsunomiya, Yasuhito, Kentaroh Toyoda, and Iwao Sasase. "LPCQP: Lightweight Private Circular Query Protocol with Divided POI-table and Somewhat Homomorphic Encryption for Privacy-Preserving k-NN Search." Journal of Information Processing 24, no. 1 (2016): 109–22. http://dx.doi.org/10.2197/ipsjjip.24.109.
Full textSaha, Tushar Kanti, and Takeshi Koshiba. "Efficient Private Conjunctive Query Protocol Over Encrypted Data." Cryptography 5, no. 1 (January 18, 2021): 2. http://dx.doi.org/10.3390/cryptography5010002.
Full textTan, Si-Hui, Yingkai Ouyang, and Peter P. Rohde. "Practical somewhat-secure quantum somewhat-homomorphic encryption with coherent states." Physical Review A 97, no. 4 (April 5, 2018). http://dx.doi.org/10.1103/physreva.97.042308.
Full textBadawi, Ahmad Al, Bharadwaj Veeravalli, Chan Fook Mun, and Khin Mi Mi Aung. "High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA." IACR Transactions on Cryptographic Hardware and Embedded Systems, May 8, 2018, 70–95. http://dx.doi.org/10.46586/tches.v2018.i2.70-95.
Full textYasuda, Masaya, Takeshi Shimoyama, and Jun Kogure. "Secret computation of purchase history data using somewhat homomorphic encryption." Pacific Journal of Mathematics for Industry 6, no. 1 (October 14, 2014). http://dx.doi.org/10.1186/s40736-014-0005-x.
Full textMigliore, Vincent, Guillaume Bonnoron, and Caroline Fontaine. "Practical Parameters for Somewhat Homomorphic Encryption (SHE) Schemes on Binary Circuits." IEEE Transactions on Computers, 2018, 1. http://dx.doi.org/10.1109/tc.2018.2808962.
Full textRauthan, J. S. "Fully homomorphic encryption: A case study." Journal of Intelligent & Fuzzy Systems, September 17, 2022, 1–21. http://dx.doi.org/10.3233/jifs-221454.
Full textYasuda, Masaya, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, and Takeshi Koshiba. "On the exact decryption range for Gentry–Halevi's implementation of fully homomorphic encryption." Journal of Mathematical Cryptology 8, no. 3 (January 1, 2014). http://dx.doi.org/10.1515/jmc-2013-0024.
Full textJin, Xin, Hongyu Zhang, Xiaodong Li, Haoyang Yu, Beisheng Liu, Shujiang Xie, Amit Kumar Singh, and Yujie Li. "Confused Modulo Projection based Somewhat Homomorphic Encryption -Cryptosystem, Library and Applications on Secure Smart Cities." IEEE Internet of Things Journal, 2021, 1. http://dx.doi.org/10.1109/jiot.2020.3015032.
Full text