Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Hilder V. L. Pereira"'
Autor:
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware acceler
Externí odkaz:
https://doaj.org/article/ad97ff20864c4b7e9cceb6b4776a828c
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:670-683
We propose homomorphic algorithms for privacy-preserving applications where we are given an encrypted dataset and we want to compute the number of elements that share a common property. We consider a two party scenario between a client and a server,
Autor:
Hilder V. L. Pereira
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578077
ACNS (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
ACNS (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
We propose a leveled homomorphic encryption scheme based on the Approximate Greatest Common Divisor (AGCD) problem that operates natively on vectors and matrices. To overcome the limitation of large ciphertext expansion that is typical in AGCD-based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2cedf0a42163c2ae97def24b79010de1
https://doi.org/10.1007/978-3-030-57808-4_6
https://doi.org/10.1007/978-3-030-57808-4_6
Publikováno v:
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Indistinguishability obfuscation constructions based on matrix branching programs generally proceed in two steps: first apply Kilian’s randomization of the matrix product computation, and then encode the matrices using a multilinear map scheme. In
Autor:
Hilder V. L. Pereira, Diego F. Aranha
Publikováno v:
Anais do XVI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2016).
Tarefas de aprendizagem de máquina normalmente exigem que grandes quantidades de dados sensíveis sejam compartilhados, o que é notoriamente intrusivo em termos de privacidade. Terceirizar esta computação para a nuvem requer que o servidor seja c