搜索结果: 1-15 共查到“军队指挥学 fully homomorphic encryption”相关记录96条 . 查询时间(0.068 秒)
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Fully Homomorphic Encryption Neural Networks LWE
2019/8/30
Securing Neural Network (NN) computations through the use of Fully Homomorphic Encryption (FHE) is the subject of a growing interest in both communities. Among different possible approaches to that to...
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Fully-Homomorphic Encryption High-Rate Time-Lock Puzzles
2019/6/19
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-homomorphic encryption schemes to obtain constructions with new properties. Specifically, we present ...
On the Plausibility of Fully Homomorphic Encryption for RAMs
Fully Homomorphic Encryption Oblivious Ram Secret-Key Private Information Retrieval
2019/6/4
We initiate the study of fully homomorphic encryption for RAMs (RAM-FHE). This is a public-key encryption scheme where, given an encryption of a large database DD, anybody can efficiently compute an e...
Fully Homomorphic Encryption with k-bit Arithmetic Operations
FHE lattices learning with errors (LWE)
2019/5/21
We present a fully homomorphic encryption scheme continuing the line of works of Ducas and Micciancio (2015, [DM15]), Chillotti et al. (2016, [CGGI16a]; 2017, [CGGI17]; 2018, [CGGI18a]), and Gao (2018...
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
private queries encrypted database homomorphic encryption
2019/4/3
To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, ``x=y,x≠yx=y,x≠y'', have been widely studied with many proposals but ...
Fully homomorphic encryption modulo Fermat numbers
public-key cryptography Fully Homomorphic Encryption
2019/3/1
In this paper, we recast state-of-the-art constructions for fully homomorphic encryption in the simple language of arithmetic modulo large Fermat numbers. The techniques used to construct our scheme a...
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
fully homomorphic encryption logistic regression genome privacy
2019/2/27
Background Privacy-preserving computations on genomic data, and more generally on medical data, is a critical path technology for innovative, life-saving research to positively and equally impact the ...
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
Multi-key fully homomorphic encryption (MKFHE) NTRU two-round MPC
2019/1/4
Multi-key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users (public keys), and the results can be jointly decrypted using the secret keys of all the ...
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
private set intersection homomorphic encryption
2018/9/6
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the intersection of their private sets without revealing extra information to each other. We are interested i...
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning
fully homomorphic encryption Ring-LWE neural network
2018/8/21
This work describes a common framework for scale-invariant families of fully homomorphic schemes based on Ring-LWE, unifying the plaintext space and the noise representation. This new formalization al...
Efficient Fully Homomorphic Encryption Scheme
Fully homomorphic encryption data security lattices
2018/7/9
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years have witnessed dramatic progress on designing more efficient homomorphic encryption schemes, and some ...
We present a new method that produces bounded FHE schemes (see Definition 3), starting with encryption schemes that support one algebraic operation. We use this technique to construct examples of encr...
Logistic regression over encrypted data from fully homomorphic encryption
homomorphic encryption logistic regression
2018/5/22
More precisely, given a list of approximately 15001500 patient records, each with 1818 binary features containing information on specific mutations, the idea was for the data holder to encrypt the rec...
TFHE: Fast Fully Homomorphic Encryption over the Torus
Fully Homomorphic Encryption Bootstrapping Lattices
2018/5/11
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE), that revisits, generalizes and improves the fully homomorphic encryption (FHE) based on GSW and its ring variants....
Secure Search via Multi-Ring Fully Homomorphic Encryption
secure search fully homomorphic encryption arithmetic circuit
2018/3/9
Secure search is the problem of securely retrieving from a database table (or any unsorted array) the records matching specified attributes, as in SQL ``SELECT...WHERE...'' queries, but where the data...