Zobrazeno 1 - 10
of 118
pro vyhledávání: '"TFHE"'
Autor:
Benqiang Wei, Xianhui Lu
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-14 (2024)
Abstract Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was propos
Externí odkaz:
https://doaj.org/article/7a207e096fc74ea7a9bc8b0cc91ac68e
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
In recent years, the research community has made great progress in improving techniques for privacy-preserving computation, such as fully homomorphic encryption (FHE). Despite the progress, there remain open challenges, mainly in performance and usab
Externí odkaz:
https://doaj.org/article/d54bd0146a734cc38a1411bbfc4be896
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme tha
Externí odkaz:
https://doaj.org/article/c5e3f6bdd00445688f4ea87854f4638a
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
We propose a new framework to homomorphically evaluate Boolean functions using the Torus Fully Homomorphic Encryption (TFHE) scheme. Compared to previous approaches focusing on Boolean gates, our technique can evaluate more complex Boolean functions
Externí odkaz:
https://doaj.org/article/eaff9813f1b44c1c83bd36593aab188d
Publikováno v:
International Journal of Group Theory, Vol 14, Iss 2, Pp 59-73 (2023)
The homomorphic encryption allows us to operate on encrypted data, making any action less vulnerable to hacking. The implementation of a fully homomorphic cryptosystem has long been impracticable. A breakthrough was achieved only in 2009 thanks to Ge
Externí odkaz:
https://doaj.org/article/e96ce213cab6496f844fb56090b5094d
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
The functional bootstrap in FHEW/TFHE allows for fast table lookups on ciphertexts and is a powerful tool for privacy-preserving computations. However, the functional bootstrap suffers from two limitations: the negacyclic constraint of the lookup tab
Externí odkaz:
https://doaj.org/article/d3922c69f04c4bd182948d78f2b7a10c
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 2, Pp 641-650 (2023)
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly. Privacy-preserving
Externí odkaz:
https://doaj.org/article/5e13864c272d45ea9fb9df148f04bb9e
Autor:
Jeongeun Park, Sergi Rovira
Publikováno v:
IEEE Access, Vol 11, Pp 118625-118638 (2023)
TFHE is a practical fully homomorphic encryption scheme (FHE) capable of computing any boolean gate or non-linear function. The scheme was originally designed to work for the single key setting. To implement realistic application scenarios, it is nec
Externí odkaz:
https://doaj.org/article/4b9fedd464954d8f886076aba54ec06c
Publikováno v:
Mathematics, Vol 12, Iss 3, p 458 (2024)
The bootstrapping procedure has become the main bottleneck affecting the efficiency of all known fully homomorphic encryption (FHE) schemes. The state-of-the-art scheme for efficient bootstrapping, which is called fully homomorphic encryption over th
Externí odkaz:
https://doaj.org/article/9b61cd6a90824381a8ff7ecbb69b840d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.