Articles with "homomorphic encryption" as a keyword



Photo by christianw from unsplash

Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22985

Abstract: Now various privacy‐preserving techniques have been combined with machine learning to ensure training data security. However, during the training, users were unable to select data and labels adaptively in the server, which made the trained… read more here.

Keywords: homomorphic encryption; encryption; searchable encryption; privacy preserving ... See more keywords
Photo by dtopkin1 from unsplash

Privacy protection in smart meters using homomorphic encryption: An overview

Sign Up to like & get
recommendations!
Published in 2022 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"

DOI: 10.1002/widm.1469

Abstract: This article presents an overview of the literature on privacy protection in smart meters with a particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart meters, the context in which they… read more here.

Keywords: homomorphic encryption; smart meters; privacy; privacy protection ... See more keywords
Photo by campaign_creators from unsplash

Statistical learning based fully homomorphic encryption on encrypted data

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2296-6

Abstract: Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand “what the data say”. Privacy of statistical learning, i.e., user and sensitive data,… read more here.

Keywords: encrypted data; computation; fully homomorphic; statistical learning ... See more keywords
Photo by lukaszlada from unsplash

Practical homomorphic encryption over the integers for secure computation in the cloud

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Information Security"

DOI: 10.1007/s10207-019-00427-0

Abstract: We present novel homomorphic encryption schemes for integer arithmetic, intended primarily for use in secure single-party computation in the cloud. These schemes are capable of securely computing arbitrary degree polynomials homomorphically. In practice, ciphertext size… read more here.

Keywords: security; homomorphic encryption; computation cloud;
Photo by dtopkin1 from unsplash

Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Information Security"

DOI: 10.1007/s10207-020-00506-7

Abstract: Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to collaborate, to better… read more here.

Keywords: detection; privacy preserving; intrusion detection; detection alerts ... See more keywords
Photo by scottwebb from unsplash

Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0809-4

Abstract: Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The… read more here.

Keywords: efficient online; probabilistic homomorphic; security; encryption ... See more keywords
Photo from archive.org

Secure and private control using semi-homomorphic encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Control Engineering Practice"

DOI: 10.1016/j.conengprac.2017.07.004

Abstract: Abstract Networked control systems with encrypted sensors measurements is considered. Semi-homomorphic encryption, specifically the Paillier encryption, is used so that the controller can perform the required computation on the encrypted data. Conditions on the parameters… read more here.

Keywords: private control; control; semi homomorphic; secure private ... See more keywords
Photo from wikipedia

Control-theoretic Approach to Malleability Cancellation by Attacked Signal Normalization

Sign Up to like & get
recommendations!
Published in 2019 at "IFAC-PapersOnLine"

DOI: 10.1016/j.ifacol.2019.12.171

Abstract: Abstract In this study, we propose a novel attack for encrypted control systems along with a cancellation method for the attacks. The attacks assign the poles of closed-loop systems by utilizing the malleability of homomorphic… read more here.

Keywords: control systems; control; cancellation; malleability ... See more keywords
Photo from wikipedia

Attribute-Based Adaptive Homomorphic Encryption for Big Data Security.

Sign Up to like & get
recommendations!
Published in 2021 at "Big data"

DOI: 10.1089/big.2021.0176

Abstract: There is a drastic increase in Internet usage across the globe, thanks to mobile phone penetration. This extreme Internet usage generates huge volumes of data, in other terms, big data. Security and privacy are the… read more here.

Keywords: homomorphic encryption; time; big data; methodology ... See more keywords
Photo from academic.microsoft.com

Quantum homomorphic encryption from quantum codes

Sign Up to like & get
recommendations!
Published in 2018 at "Physical Review A"

DOI: 10.1103/physreva.98.042334

Abstract: The recent discovery of fully homomorphic classical encryption schemes has had a dramatic effect on the direction of modern cryptography. Such schemes, however, implicitly rely on the assumption that solving certain computation problems is intractable.… read more here.

Keywords: quantum; quantum homomorphic; quantum codes; encryption ... See more keywords
Photo from wikipedia

Privacy-Preserving Collective Learning With Homomorphic Encryption

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3114581

Abstract: Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to health data is challenging due to privacy and legal issues. Homomorphic encryption… read more here.

Keywords: preserving collective; privacy preserving; protocol; homomorphic encryption ... See more keywords