Journal articles on the topic 'And Fully Homomorphic Encryption Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'And Fully Homomorphic Encryption Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, V. Satish, and V.Trilik Kumar. "SECURING DATA USING FULLY HOMOMORPHIC ENCRYPTION SCHEMES OVER CLOUD COMPUTING." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 10 (2014): 1157–60. https://doi.org/10.5281/zenodo.14759355.
Full textBai, Shuangjie, Geng Yang, Jingqi Shi, Guoxiu Liu, and Zhaoe Min. "Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme." Security and Communication Networks 2018 (July 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/2363928.
Full textJarwal, Abhimanyu, Kamlesh Kumar, and Ajay Kumar. "Secure Data Encryption Scheme for Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 897–902. http://dx.doi.org/10.22214/ijraset.2023.51058.
Full textZhao, Xu, and Zheng Yuan. "Threshold Fully Homomorphic Encryption Scheme Based on NGS of Symmetric Encryption." Symmetry 17, no. 5 (2025): 737. https://doi.org/10.3390/sym17050737.
Full textEL-YAHYAOUI, Ahmed, and Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security." Technologies 7, no. 1 (2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Full textPan, Jingshan, Tongtong Sui, Wen Liu, et al. "Secure Control of Linear Controllers Using Fully Homomorphic Encryption." Applied Sciences 13, no. 24 (2023): 13071. http://dx.doi.org/10.3390/app132413071.
Full textIchibane, Yacine, Youssef Gahi, Mouhcine Guennoun, and Zouhair Guennoun. "Fully Homomorphic Encryption Without Noise." International Journal of Smart Security Technologies 6, no. 2 (2019): 33–51. http://dx.doi.org/10.4018/ijsst.2019070102.
Full textEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Full textShen, Jiachen, Yekang Zhao, Shitao Huang, and Yongjun Ren. "Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption." Electronics 13, no. 22 (2024): 4478. http://dx.doi.org/10.3390/electronics13224478.
Full textMahmood, Zainab H., and Mahmood K. Ibrahem. "HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV." Iraqi Journal of Information & Communications Technology 2, no. 2 (2019): 44–57. http://dx.doi.org/10.31987/ijict.2.2.69.
Full textPrasad, S. V. Suriya, and K. Kumanan. "Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security." International Journal Of Engineering And Computer Science 7, no. 03 (2018): 23785–89. http://dx.doi.org/10.18535/ijecs/v7i3.22.
Full textChen, Hu, Yupu Hu, Zhizhu Lian, Huiwen Jia, and Xu An Wang. "An Additively Homomorphic Encryption over Large Message Space." International Journal of Information Technology and Web Engineering 10, no. 3 (2015): 82–102. http://dx.doi.org/10.4018/ijitwe.2015070106.
Full textWang, Ziwei, Ruwei Huang, and Xiyi Wei. "A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts." Applied Sciences 15, no. 1 (2025): 473. https://doi.org/10.3390/app15010473.
Full textZhu, Zong-Wu, and Ru-Wei Huang. "Efficient SMC Protocol Based on Multi-Bit Fully Homomorphic Encryption." Applied Sciences 11, no. 21 (2021): 10332. http://dx.doi.org/10.3390/app112110332.
Full textQu, Quanbo, Baocang Wang, Yuan Ping, and Zhili Zhang. "Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme." Security and Communication Networks 2019 (June 2, 2019): 1–6. http://dx.doi.org/10.1155/2019/8319508.
Full textMahmood, Zainab H., and Mahmood K. Ibrahem. "Fully Homomorphic Encryption Scheme Over Integers Based on DGHV Scheme." Control Systems and Optimization Letters 1, no. 3 (2023): 169–73. http://dx.doi.org/10.59247/csol.v1i3.45.
Full textWang, Xun, Tao Luo, and Jianfeng Li. "An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud." International Journal of Pattern Recognition and Artificial Intelligence 34, no. 04 (2019): 2055008. http://dx.doi.org/10.1142/s0218001420550083.
Full textLuo, Fucai, Fuqun Wang, Kunpeng Wang, Jie Li, and Kefei Chen. "LWR-Based Fully Homomorphic Encryption, Revisited." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/5967635.
Full textAl Attar, Tara, and Mohammed Anwar MOHAMMED. "Fully Homomorphic Encryption Scheme for Securing Cloud Data." UHD Journal of Science and Technology 7, no. 2 (2023): 40–49. http://dx.doi.org/10.21928/uhdjst.v7n2y2023.pp40-49.
Full textZhao, Dongfang. "Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis." Cryptography 9, no. 2 (2025): 44. https://doi.org/10.3390/cryptography9020044.
Full textQin, Xiaoyue, Ruwei Huang, and Huifeng Fan. "An Effective NTRU-Based Fully Homomorphic Encryption Scheme." Mathematical Problems in Engineering 2021 (August 6, 2021): 1–9. http://dx.doi.org/10.1155/2021/9914961.
Full textWang, Xun, Tao Luo, and Jianfeng Li. "A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes." Security and Communication Networks 2018 (December 16, 2018): 1–14. http://dx.doi.org/10.1155/2018/8706940.
Full textShen, Tongchen, Fuqun Wang, Kefei Chen, Zhonghua Shen, and Renjun Zhang. "Compressible Multikey and Multi-Identity Fully Homomorphic Encryption." Security and Communication Networks 2021 (March 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/6619476.
Full textLi, Lingwu, and Ruwei Huang. "Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping." Mathematics 11, no. 14 (2023): 3239. http://dx.doi.org/10.3390/math11143239.
Full textZhao, Jianan, Ruwei Huang, and Bo Yang. "Efficient GSW-Style Fully Homomorphic Encryption over the Integers." Security and Communication Networks 2021 (March 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/8823787.
Full textKim, Jae-Heon, Sang-Kyung Yoo, and Sang-Han Lee. "Fully Homomorphic Encryption Scheme without Key Switching." Journal of Korea Information and Communications Society 38C, no. 5 (2013): 428–33. http://dx.doi.org/10.7840/kics.2013.38c.5.428.
Full textChalla, Ratnakumari, and VijayaKumari Gunta. "Towards the Construction of Reed-Muller Code Based Symmetric Key FHE." Ingénierie des systèmes d information 26, no. 6 (2021): 585–90. http://dx.doi.org/10.18280/isi.260609.
Full textLiu, Yuan, Yun Pan, Lize Gu, Yuan Zhang, and Dezhi An. "Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext." Mathematical Problems in Engineering 2021 (February 2, 2021): 1–10. http://dx.doi.org/10.1155/2021/6656764.
Full textChen, Yuyue, Ruwei Huang, and Bo Yang. "Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE." Applied Sciences 12, no. 17 (2022): 8420. http://dx.doi.org/10.3390/app12178420.
Full textJin, Lei, and Xin Xia Song. "The Analysis of Constructing Fully Homomorphic Encryption over Integers." Advanced Materials Research 989-994 (July 2014): 4780–84. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4780.
Full textNataraja B S, Meenakshi R, and Shwetha T P. "Homomorphic encryption for privacy-preserving computation." World Journal of Advanced Research and Reviews 5, no. 1 (2020): 136–44. https://doi.org/10.30574/wjarr.2020.5.1.0053.
Full textSabnis, Prof Shweta, and Prof Pavan Mitragotri. "The Next Frontier of Security: Homomorphic Encryption in Action." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 158–70. http://dx.doi.org/10.22214/ijraset.2024.57921.
Full textWu, Meng, Xiufeng Zhao, and Weitao Song. "Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme." Information 16, no. 3 (2025): 200. https://doi.org/10.3390/info16030200.
Full textZhao, Xiufeng, and Ailan Wang. "Generalized Bootstrapping Technique Based on Block Equality Test Algorithm." Security and Communication Networks 2018 (December 24, 2018): 1–8. http://dx.doi.org/10.1155/2018/9325082.
Full textXie, Yuqi, Ruwei Huang, and Junbin Qiu. "Verifiable Threshold Multi-Party Fully Homomorphic Encryption from Share Resharing." Applied Sciences 15, no. 9 (2025): 4745. https://doi.org/10.3390/app15094745.
Full textSong, Mingyang, Yingpeng Sang, Yuying Zeng, and Shunchao Luo. "Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption." Security and Communication Networks 2021 (June 24, 2021): 1–14. http://dx.doi.org/10.1155/2021/9962575.
Full textVizár, Damian, and Serge Vaudenay. "Cryptanalysis of chosen symmetric homomorphic schemes." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 288–306. http://dx.doi.org/10.1556/012.2015.52.2.1311.
Full textFan, Huifeng, Ruwei Huang, and Fengting Luo. "Efficient Multi-Identity Full Homomorphic Encryption Scheme on Lattice." Applied Sciences 13, no. 10 (2023): 6343. http://dx.doi.org/10.3390/app13106343.
Full textBoura, Christina, Nicolas Gama, Mariya Georgieva, and Dimitar Jetchev. "CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes." Journal of Mathematical Cryptology 14, no. 1 (2020): 316–38. http://dx.doi.org/10.1515/jmc-2019-0026.
Full textXin, Dan, Jingzhou Ji, Feng Jing, Mei Gao, and Bin Xue. "Efficient Fully homomorphic encryption scheme using Ring-LWE." Journal of Physics: Conference Series 1738 (January 2021): 012105. http://dx.doi.org/10.1088/1742-6596/1738/1/012105.
Full textARITA, Seiko, and Sari HANDA. "Fully Homomorphic Encryption Scheme Based on Decomposition Ring." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E103.A, no. 1 (2020): 195–211. http://dx.doi.org/10.1587/transfun.2019cip0027.
Full textHariss, Khalil, Maroun Chamoun, and Abed Ellatif Samhat. "Fully Homomorphic Encryption Scheme Based On Complex Numbers." Advances in Science, Technology and Engineering Systems Journal 4, no. 5 (2019): 30–38. http://dx.doi.org/10.25046/aj040504.
Full textMittal, Sonam, A. K. Suntheya, R. Anbunathan, and N. Ashokkumar. "A novel method of fully homomorphic encryption scheme." International Journal of Computing Science and Mathematics 20, no. 3 (2024): 228–42. http://dx.doi.org/10.1504/ijcsm.2024.142728.
Full textWang, Baocang, Yu Zhan, and Zhili Zhang. "Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme." IEEE Transactions on Information Forensics and Security 13, no. 6 (2018): 1460–67. http://dx.doi.org/10.1109/tifs.2018.2790916.
Full textKuang, Liwei, Laurence T. Yang, Jun Feng, and Mianxiong Dong. "Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme." IEEE Transactions on Cloud Computing 6, no. 3 (2018): 868–78. http://dx.doi.org/10.1109/tcc.2015.2511769.
Full text李, 明祥. "Identity-Based Integer Matrix Fully Homomorphic Encryption Scheme." Computer Science and Application 13, no. 09 (2023): 1675–90. http://dx.doi.org/10.12677/csa.2023.139166.
Full textMittal, Sonam, and Dr K. R. Ramkumar Kumar. "A Retrospective Analysis on Fully Homomorphic Encryption Scheme." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2024): 1. http://dx.doi.org/10.1504/ijesdf.2024.10053552.
Full textMittal, Sonam, and K. R. Ramkumar. "A retrospective analysis on fully homomorphic encryption scheme." International Journal of Electronic Security and Digital Forensics 16, no. 2 (2024): 223–54. http://dx.doi.org/10.1504/ijesdf.2024.137031.
Full textG., Chethana, and Padmaja K. V. "A novel secure biomedical data aggregation using fully homomorphic encryption in WSN." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 1 (2021): 428. http://dx.doi.org/10.11591/ijeecs.v24.i1.pp428-443.
Full textG., Chethana, and V. Padmaja K. "A novel secure biomedical data aggregation using fully homomorphic encryption in WSN." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 1 (2021): 428–43. https://doi.org/10.11591/ijeecs.v24.i1.pp428-443.
Full text