搜索结果: 16-30 共查到“军事学 Fully Homomorphic Encryption”相关记录96条 . 查询时间(0.024 秒)
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption
fully homomorphic encryption threshold cryptography lattices
2017/9/30
We develop a general approach to adding a threshold functionality to a large class of (non- threshold) cryptographic schemes. A threshold functionality enables a secret key to be split into a number o...
Noiseless Fully Homomorphic Encryption
Noiseless FHE Finite Non-abelian Simple Group Group Ring Matrices
2017/9/7
We try to propose two fully homomorphic encryption (FHE) schemes, one for symmetric (aka. secret-key) settings and another under asymmetric (aka. public-key) scenario. The presented schemes are noisel...
Improved Fully Homomorphic Encryption without Bootstrapping
fully homomorphic public-key encryption multivariate algebraic equation
2017/8/10
Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the wea...
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
Finite field isomorphism fully homomorphic encryption lattice-based cyrptopgraphy
2017/6/9
If qq is a prime and nn is a positive integer then any two finite fields of order qnqn are isomorphic. Elements of these fields can be thought of as polynomials with coefficients chosen modulo qq, and...
Fully Homomorphic Encryption Using Multivariate Polynomials
public-key cryptography fully homomorphic encryption multivariate cryptography
2017/5/26
Efficient and secure third party computation has many practical applications in cloud computing. We develop new approach for building fully homomorphic encryption (FHE) schemes, by starting with the i...
Threshold Fully Homomorphic Encryption
Threshold Cryptography Fully Homomorphic Encryption Function Secret Sharing
2017/3/27
We formally define and give the first construction of (leveled) threshold fully homomorphic encryption for any access structure induced by a monotone boolean formula and in particular for the threshol...
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
secure outsourcing statistics fully homomorphic encryption
2016/12/29
In recent years, there has been a growing trend towards outsourcing of computational tasks with the development of cloud services. The Gentry’s pioneering work of fully homomorphic encryption (FHE) an...
Two main computational problems serve as security foundations of current fully homomorphic encryption schemes: Regev's Learning With Errors problem (LWE) and Howgrave-Graham's Approximate Greatest Com...
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
Fully Homomorphic Encryption Bootstrapping Lattices
2016/12/9
In this paper, we revisit fully homomorphic encryption (FHE) based on GSW and its ring variants. We notice that the internal product of GSW can be replaced by a simpler external product between a GSW ...
Fully Homomorphic Encryption with Zero Norm Cipher Text
fully homomorphic encryption octonion factoring
2016/6/29
Gentry抯 bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak...
Fully Homomorphic Encryption with Isotropic Elements
fully homomorphic encryption isotropic octonion multivariate algebraic equation
2016/5/17
In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the enciphering function. In this paper I propose the fully homomorphic encryption scheme w...
Fully Homomorphic Encryption for Point Numbers
Fully homomorphic encryption FV scheme Fixed point number
2016/4/26
In this paper, based on the FV scheme, we construct a first fully homomorphic encryption scheme FHE4FX that can homomorphically compute addition and/or multiplication of encrypted fixed point numbers ...
A note on Ring-LWE security in the case of Fully Homomorphic Encryption
practical security ring-lwe fully homomorphic encryption
2016/4/18
Evaluating the practical security of Ring-LWE based cryptography has attracted
lots of efforts recently. Indeed, some differences from the standard LWE problem
enable new attacks. In this paper we d...
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
homomorphic encryption matrix factorization gradient descent
2016/3/4
Recommendation systems become popular in our daily life. It is well known that the more
the release of users’ personal data, the better the quality of recommendation. However, such
services raise se...
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
attribute based encryption fully homomorphic encryption LWE
2016/2/23
The only known way to achieve Attribute-based Fully Homomorphic Encryption (ABFHE)
is through indistinguishability obfsucation. The best we can do at the moment without obfuscation is
Attribute-Base...